?A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.
A. ?procedural language
B. ?query by example language
C. ?query language
D. ?imperative language
Answer: C
You might also like to view...
The process to induce you to provide personal information through a website is called cyberstalking
Indicate whether the statement is true or false.
Which of the following log analysis techniques compares the log entries against a set of known bad activity?
A. Trend analysis B. Signature analysis C. Correlation analysis D. Sequencing analysis
Which of the following would be true if Tony chooses to link the video instead of embed it?
a. The file size of the document will be considerably larger. b. The video must download completely before it begins to play. c. The video can only be edited by republishing the document. d. The frame rate of the video does not have to match the frame rate of the Flash document.
Your company shares a building with a competitor’s branch office. Recently, you noticed that some computers other than company computer have tried to connect to the wireless network unsuccessfully. When you are in the parking lot, you also notice that the company’s wireless network SSID can be seen on your smartphone.What can you do to make sure no one outside your company can gain access to its wireless network? (Select all that apply.)
A. Disable SSID broadcasting. B. Lower radio power levels. C. Add access points. D. Enable MAC filtering. E. Set up firewall settings.