_____ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.
A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"
Answer: A
Management Information Systems Multiple Choice Questions and Answers.
A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"
Answer: A
If the answers is incorrect or not given, you can answer the above question in the comment box. If the answers is incorrect or not given, you can answer the above question in the comment box.