Procedures for adding users, removing users, and dealing with security issues are examples of ___________ policies
a. User
b. Computer
c. System administration
d. Password
Answer C.
Computer Science & Information Technology
You might also like to view...
Use a(n) ________ chart when you want to show trends over time
Fill in the blank(s) with correct word
Computer Science & Information Technology
When Outlook detects a macro attempting to send an e-mail, it launches a warning box. If the user clicks the REJECT button inside the warning box, Access will halt the macro process and will not complete any further actions
Indicate whether the statement is true or false
Computer Science & Information Technology