The ________ is deployed directly to users and contains nondata objects such as queries, reports, forms, macros, and VBA modules

A) front-end database
B) back-end database
C) linked table
D) database splitter


A

Computer Science & Information Technology

You might also like to view...

When host computers are added to the VMM environment, a job is run to deploy _________ to the selected host computers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Chart Styles group contains predefined styles that control the range of the data and the numbers in the chart

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ________ is a predefined combination of colors, fonts, and effects that is applied as a single selection

Fill in the blank(s) with correct word

Computer Science & Information Technology

The CIO of the company is concerned about hackers compromising the Linux servers. To allay his fears, the security analyst instructs the Linux admin to mount the tmp directly with the noexec parameter. What activity will this prevent?

A. reading data in the directory B. writing data to the directory C. running binary code in the directory D. deleting data in the directory

Computer Science & Information Technology