Which of the following is not a good ICT security policy?...
Which of the following is not a good ICT security policy?
Re-use of old password
Frequent change of password
Backing up files and documents
Scanning e-mail attachment for virus before opening it
Correct answer is A
No explanation has been provided for this answer.
The equivalent of the decimal number 89 in base 4 is? ...
Which of these programming languages is the most suitable for a business data processing? ...
The MS-Windows shortcut keys to initiate warm booting is? ...
The following instructions are guidelines for drawing flowcharts except that? ...
The result of the expression 2*6+2/4*2*4^2 ...
The speed of data transfer in the computer can be determined in terms of? ...
The command line prompt of MS-DOS operating system is represented as? ...