Which of the following is checked in the Access Trust Center?
A) Macros, multivalued fields, and flagged fields
B) Field properties, digital signatures, and source tables
C) All flagged fields and multivalued fields
D) Macros and digital signatures
D
You might also like to view...
Which of the following techniques virus scanners use to find viruses?
a. Monitors if any program is trying to modify system files b. Monitors the system for certain type of behaviors typical for viruses c. Compares the files on the system against a database of known virus files d. All the above
The + symbol is an example of a(n) ____ operator.
A. arithmetic B. logical C. comparison D. calculation
Used in conjunction with an XML parser that supports data validation, a DTD can be used to accomplish what?
What will be an ideal response?
The desktop application(s) that require the great power of today’s microprocessor-based systems include___________.
A. image processing B. speech recognition C. videoconferencing D. all of the above