Procedures for adding users, removing users, and dealing with security issues are examples of ___________ policies

a. User
b. Computer
c. System administration
d. Password

Answer C.

Computer Science & Information Technology

You might also like to view...

Use a(n) ________ chart when you want to show trends over time

Fill in the blank(s) with correct word

Computer Science & Information Technology

When Outlook detects a macro attempting to send an e-mail, it launches a warning box. If the user clicks the REJECT button inside the warning box, Access will halt the macro process and will not complete any further actions

Indicate whether the statement is true or false

Computer Science & Information Technology