When protecting a database ________

A) use multiple passwords
B) split it
C) lock all forms
D) use a strong password


D

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. The modulus operator, %, returns the remainder of integer division. 2. The result of integer division is truncated in Java.

Computer Science & Information Technology

The ________ data type is usually used for values such as True/False or On/Off

A) Binary B) Logical C) Yes/No D) T/F

Computer Science & Information Technology

You have seen the reported problem that the computer will not boot. Which step of the troubleshooting process will you do next?

A) Establish a theory of probable cause. B) Test a theory to determine the cause. C) Identify the problem. D) Establish a plan of action.

Computer Science & Information Technology

Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?

A. The recipient can verify integrity of the software patch. B. The recipient can verify the authenticity of the site used to download the patch. C. The recipient can request future updates to the software using the published MD5 value. D. The recipient can successfully activate the new software patch.

Computer Science & Information Technology