Which of the following is not a good ICT security policy?...
Which of the following is not a good ICT security policy?
Re-use of old password
Frequent change of password
Backing up files and documents
Scanning e-mail attachment for virus before opening it
Correct answer is A
No explanation has been provided for this answer.
An advantage of sequential access over serial access is that_______ ...
The part of the computer that holds the data and pro- grams for CPU processing is the? ...
Sorting of records is sufficient and a necessary condition for creating? ...
Computer files can be characterised by all but, ...
Which of the following components are data communication equipment? I. Scanner ll. Hub lIl. Modem...
Search engines are used for the following except? ...
Use figure 4 to answer question 23 The basic problem with the flow chart is that it has ...
Programming language COBOL works best for use in ...
Use the BASIC program below to answer questions 23 to 25 10 LET K = 2 20 LET L = 9 30 LET SUM = 0...
In order to get to the symbol dialog box in MS-Word click on the? ...