Answer: D, Most laws are directed at the information, data, or intellectual property rather than the IT professional.
Explanation:i just took the test
<span>the three fundamental elements of an effective security program for information systems are Identification, Authentication and Authorization.The access control creates the user and assigns the rights to resources and authorization is giving permissions to the users to access the resources.The user who wants to enter the system should have a valid data t enter the system like password, fingerprint or any other type of recognition.</span>
Answer:
it can balance computing resources by time
Explanation:
this this is as it involves multiprogramming
Anti-spam <span>software is used to block unwanted e-mail and is available at many levels.</span>