Which of the following is not a good ICT security policy?...
Which of the following is not a good ICT security policy?
Re-use of old password
Frequent change of password
Backing up files and documents
Scanning e-mail attachment for virus before opening it
Correct answer is A
No explanation has been provided for this answer.
Which of these storage media has the lowest capacity? ...
During program execution in the central processing unit, the instruction is interpreted by the? ...
Computers that are portable and convenient for users who travel are known as _________________ ...
To send a created MS PowerPoint document using email to a use the document can be added as? ...
The logical unit of transfer between the backing storage and main memory in file organization i...
In BASIC, REM shows a statement to be...
___________ booting is done by turning on the computer at first instance. ...
Which of the columns needs to be adjusted to accommodate the cells contents? ...