Which of the following is NOT a method to help secure an Access database?
A. Password
B. Encryption
C. Show/hide objects
D. Attachment fields
Answer: D
You might also like to view...
What does the "X" in "AJAX" stand for?
a. XHTML b. XAML c. XPath d. XML
Resources in the World Wide Web and other services are named by URLs. What do the initials URL denote? Give examples of three different sorts of web resources that can be named by URLs.
What will be an ideal response?
The UML provides ____________________ diagram types that you can use to model systems.
Fill in the blank(s) with the appropriate word(s).
A company is involved in major litigation with another corporation regarding a patent dispute used in both of their document imaging systems. An attorney for one of the companies has filed a motion to have certain documents withheld from the discovery process because he considers them to be work product. What type of documents is he trying to protect?
a. Documents that were prepared while developing the product in dispute. b. Documents that define the exact specifications for engineering the disputed product. c. Documents prepared by the legal team in anticipation of litigation. d. The attorney is simply trying to buy time. There is no work product privilege that can be invoked in a civil suit.