Which of the following is not a good ICT security policy?...
Which of the following is not a good ICT security policy?
Re-use of old password
Frequent change of password
Backing up files and documents
Scanning e-mail attachment for virus before opening it
Correct answer is A
No explanation has been provided for this answer.
The first calculating device is the? ...
identify the memory module with the largest physical Size? ...
Integrated circuit chips used in micro computer are made of element called? ...
The ...... is added to a host computer hardware in order to expand its abilities? ...
Which of the following tasks is accomplished by using bookmarks? To ...
___ is the type of computer that is designed to operate on two states, 0 and 1 ...
Use Table 3 to answer the questions below A B C D E 1 BOOK SUP...