1.

A computer security protocol for logging in would be an example of the __________________ component of an information system.

A. Software
B. Hardware
C. Data
D. Procedure
Answer» E.


Discussion

No Comment Found