Statements A, B, D, E and F express key elements of good ICT policy design and implementation, while C is clearly false. Policies commonly address acceptable use, passwords, training, sanctions and stakeholder input. They must also be revised periodically in response to evolving technologies and threats. Therefore C cannot be accepted, and the correct set includes all other statements.
Option A:
Option A is incorrect because it omits F, which emphasises consultation with stakeholders. A policy developed without considering user perspectives may face resistance or fail to address real needs. Hence A, B, D and E alone do not represent the full set of correct statements.
Option B:
Option B is incorrect because it drops B, removing explicit reference to password and account security. Even though A, D, E and F are true, leaving out this component makes the description of policy scope incomplete.
Option C:
Option C is incorrect because it excludes A, which states that ICT policies cover acceptable use of networks and devices. B, D, E and F are true, but omitting A leaves out a central content area of most institutional ICT policies.
Option D:
Option D is correct because it contains all the true statements and omits only C, which wrongly suggests that policies never need revision. It therefore reflects both the substantive focus and dynamic nature of ICT policy-making in institutions.
Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!