True/False
Once the data from the source documents have been keyed into the computer, the source document can be destroyed.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: This type of authentication uses some unique
Q7: Which of the following would normally not
Q41: This type of control is intended to
Q55: There are a number of reasons that
Q155: Deciphering renders data useless to those who
Q156: This security feature, used on wireless networks,
Q157: Two or more computer network or data
Q158: All of the following are environmental control
Q161: The average annual cost of cyber crime
Q164: Controlling access to the operating system is