When choosing a secure ________________, it should include a combination of letters, numbers, and symbols. (Topic 3)
Work product doctrine ____________ __________ protect docume…
Work product doctrine ____________ __________ protect documents prepared in the normal operation of the client’s business. (Topic 2)
In setting up _______________ features on a database, the n…
In setting up _______________ features on a database, the need to protect information must be balanced against the need for access to the information. (Topic 7)
_________________ _______________ allows you to view your st…
_________________ _______________ allows you to view your strategy by seeing all the changes that have been made in a single document. (Topic 5)
A _______________ law office is a law practice that exists e…
A _______________ law office is a law practice that exists entirely online. (Topic 2)
The first step in creating a client database is to _________…
The first step in creating a client database is to _________________ what pieces of information need to be collected about each client. (Topic 7)
An increasing number of _____________ jurisdictions have est…
An increasing number of _____________ jurisdictions have established procedures for the electronic filing of documents. (Topic 4)
________ software provides the basic instructions for starti…
________ software provides the basic instructions for starting up the computer and processing the basic input and output activity. (Topic 3)
_________ _________ feature allows a user to create multiple…
_________ _________ feature allows a user to create multiple mailings by automatically combining a document, such as a form letter, with a list of recipients. (Topic 5)
Inadvertent disclosure of confidential information admissibi…
Inadvertent disclosure of confidential information admissibility depends on ________ __________ before and after the disclosure. (Topic 2)