Multiple Choice
_____________ are often based on the concept of redundancy.
A) File protection rings
B) Lock out procedures
C) Rollback processing
D) Fault-tolerant systems
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q15: According to the text, data transcription would
Q25: Consensus-based protocols contain an odd number of
Q34: When a company is setting up its
Q36: Within database systems, a control that restricts
Q48: The least effective physical security control for
Q49: Output controls for the computerized accounting information
Q57: Additional input controls include all but one
Q71: An effective control for maintaining the privacy
Q75: Which of the following is not a
Q93: No record of transactions is made in