The database must be opened in ________ mode before it can be encrypted

A) decrypted B) exclusive C) read-only D) secured


B

Computer Science & Information Technology

You might also like to view...

In PHP-MySQL connectivity, what is the purpose of the @ symbol?

a. error suppression b. connection string c. alternate credentials d. HTTPS instead of HTTP transmission

Computer Science & Information Technology

In Publisher, use the commands in the ________ group to indicate how images should display in relation to existing text

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following viruses was distributed as an e-mail attachment and used Microsoft Outlook to e-mail itself to the first 50 contacts in the user address book?

A. Zeus B. SpyEye C. Slammer D. Melissa

Computer Science & Information Technology

In defining exactly what any particular account can or cannot do to a file or folder, it is considered best practice to assign _______________ to groups and then add user accounts to groups.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology