Exercise 35- Pick the best answer
1. D mobile devices should have strong password protection to access organizational systems.
2. A both ISPs and government together can develop a strong framework for cybersecurity
3. B invoice is an agreement for purchase of goods.
4. C since its processing needs are not linked it is a decentralised system.
5. C Computer input control ensures data received is authorised and converted to machine readable language.
6. A IT policy are used in asset intensive and centralised organisations.
7. D SQL is related to Relational databases.
8. A Header label is used to identify the file which is next store in magnetic tape. Sometimes computer operator store files in different places in magnetic tape, on that condition file can be search using information which store in header label. So it is necessary to use header label in conjunction with magnetic tape.
9. A Journal entries is followed by ledger posting
10. B Vendor security failure is least in cloud computing compared to local server storage.
Exercise 35- Pick the best answer Bloomsdale wants to determine if the company from whom she buys seafood is buyi...