If you cannot disable remote access, you should secure the MySQL server behind a(n) ____.

A. server
B. firewall
C. cell block
D. IP address


Answer: B

Computer Science & Information Technology

You might also like to view...

When multiple data files are open in a single application, you can ____________________ the mouse pointer over the task bar button to see a preview of the files and select the one you want.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ________ is used to setup a maintenance plan for running system tools

Fill in the blank(s) with correct word

Computer Science & Information Technology

Figure PPT 8-1 What is the shortcut menu shown in the accompanying figure used for?

A. Setting up slide shows B. Annotating a presentation C. Rehearsing timings D. Recording presentations

Computer Science & Information Technology

_____ is used to ensure that business transactions are processed efficiently and accurately and that the resulting information can be accessed by end users and managers in all business areas.

a. An enterprise system b. Aggregate planning c. Crisis management d. A justification document

Computer Science & Information Technology