When protecting a database ________
A) use multiple passwords
B) split it
C) lock all forms
D) use a strong password
D
You might also like to view...
Answer the following questions true (T) or false (F)
1. The modulus operator, %, returns the remainder of integer division. 2. The result of integer division is truncated in Java.
The ________ data type is usually used for values such as True/False or On/Off
A) Binary B) Logical C) Yes/No D) T/F
You have seen the reported problem that the computer will not boot. Which step of the troubleshooting process will you do next?
A) Establish a theory of probable cause. B) Test a theory to determine the cause. C) Identify the problem. D) Establish a plan of action.
Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?
A. The recipient can verify integrity of the software patch. B. The recipient can verify the authenticity of the site used to download the patch. C. The recipient can request future updates to the software using the published MD5 value. D. The recipient can successfully activate the new software patch.