You can set security restriction policies to specify rules that govern exceptions to the security level you specified, and the rule that identifies software according to an Internet Explorer network zone, including the Internet, Local Intranet, Trusted sites, and Restricted sites zones is the New _________Rule
a. Certificate
b. Hash
c. Network Zone
d. Path
C. You can specify zone rules only for Windows Installer software packages.
You might also like to view...
If the line:
friend class A; appears in class B, and the line: friend class B; appears in class C, then: a. Class A is a friend of class C. b. Class A can access private variables of class B. c. Class C can call class A’s private member functions. d. Class B can access class A’s private variables.
When a macro is executed, it starts recording keystrokes
Indicate whether the statement is true or false
Your co-worker sends you a database that he created in Access 2007. You cannot open the database on your computer that uses Access 2003. Your coworker probably took what action?
A) Used an unauthorized copy of Access 2007 to create the database. B) Put a password on the database. C) Forgot to change the file format to an Access 2003 compatible version. D) Sent you a corrupt file.
A Gantt chart can simplify a complex project by combining several activities into a task _____ that contains subsidiary tasks.
A. group B. hierarchy C. network D. bar