Which of the following is not a good ICT security policy?...
Which of the following is not a good ICT security policy?
Re-use of old password
Frequent change of password
Backing up files and documents
Scanning e-mail attachment for virus before opening it
Correct answer is A
No explanation has been provided for this answer.
The logical unit of transfer between the backing storage and main memory in file organization i...
In Microsoft Excel, sheet tabs can be renamed by ______ ...
The Domain name of a website is also its__________ ...
The chart type that does not have the X and Y axis display is the? ...
The following instructions are guidelines for drawing flowcharts except that? ...
The number of entries in the diagram above is ...
The part of the MS Access interface labelled X in Figure 9 is called ...
Which of these criteria is not important while classifying files ? ...