Global variables begin with the ____ character.

A. @
B. @@
C. $
D. _


Answer: C

Computer Science & Information Technology

You might also like to view...

The ________ keyword instructs Access to return the specific fields from one or more tables or queries

A) SELECT B) FROM C) WHERE D) ORDER BY

Computer Science & Information Technology

Phishing is controlled by using S/MIME

Indicate whether the statement is true or false

Computer Science & Information Technology

Because security-in-depth has been adopted as a goal of your company, a security analyst was hired to complete a security audit. During the audit, the security analyst suggests that your company adopt a companywide security policy. Of which type of controls is this policy?

A. Administrative control B. Technical control C. Physical control D. Corrective control E. Preventive control F. Recovery control G. Statements b and d only H. Statements a and e only I. Statements c and f only

Computer Science & Information Technology

What keyword always refers to the superclass of the class in which you use it?

A. super B. parent C. upper D. base

Computer Science & Information Technology