Which of the following is NOT a modifier key?
A) Ctrl B) Alt C) CapsLock D) Shift
C
Computer Science & Information Technology
You might also like to view...
On its surface, the Privacy Protection Act applies specifically to computer searches, while the Electronic Communications Privacy Act attaches the same significance to electronic bulletin boards and other online computer systems
Indicate whether the statement is true or false.
Computer Science & Information Technology
Other than implementing preventative measures and planning out response and recovery strategies, what is another important element that will help minimize data loss in the event of a harmful event that would trigger a disaster recovery policy (DRP)?
A. End user training B. Prior warning of impending harm C. Significant expenditure on avoiding single points of failure D. Performing full interruption testing
Computer Science & Information Technology