In the context of the sources of threats, computer crime involves ________

A) poorly designed procedures
B) intentional destruction of data
C) natural events and disasters
D) poorly written applications

B

Business

You might also like to view...

The Fair Labor Standards Act applies to ________

A) employees in government organizations B) employees earning less than minimum wages C) employees engaged in the production of goods for interstate commerce D) self-employed US citizens E) A, B, and C

Business

Span of control refers to ________

A) a situation in which delegated tasks are not clearly defined B) the effectiveness of group expectations in deciding minimal standards of behavior C) the strength of group members' desire to be an active part of the team and its work D) the hierarchical rank or prestige conferred by group members to each other E) the number of subordinates that report to one supervisor

Business