{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}


Chapter12TF - T F 6 Biometric scanning systems are limited...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Name _________________________ Date ___________ Chapter 12 – True/False Instructions: Circle T if the statement is true or F if the statement is false. T F 1. Operational costs include items such as supplies, equipment rental, and software leases. T F 2. System users usually initiate preventive maintenance. T F 3. Version control is the process of archiving new system releases. T F 4. Benchmark testing uses a set of standard tests to evaluate system performance and capacity. T F 5. In the real world, absolute security is not a realistic goal.
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: T F 6. Biometric scanning systems are limited to scanning a person’s fingerprint or handprint. T F 7. A virtual private network uses a private dedicated connection, similar to a phone line. T F 8. The hardening process makes a system more secure by removing unnecessary accounts, services, and features. T F 9. When an intruder raids desks or trash bins for valuable information it is called dumpster diving. T F 10. A system becomes obsolete when it is five years old or older....
View Full Document

  • Spring '12
  • VictorBarlow
  • Virtual private network, Five years, The Real World, Biometrics in schools, Biometric scanning systems

{[ snackBarMessage ]}

Ask a homework question - tutors are online