If you want to share an Access report with someone who does not have Microsoft Office, you can export the report as a(n) ________ file

A) XLXS B) DOC C) DOCX D) PDF


D

Computer Science & Information Technology

You might also like to view...

Finding and fixing errors is called debugging the program.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following best describes an intrusion prevention system?

A. Passive devices that analyze network traffic to detect unauthorized access B. Active devices that sit inline with traffic and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content C. A software or hardware device that can filter incoming or outgoing traffic based on specific rules D. A device that monitors the characteristics of a single host and the events occurring on that host

Computer Science & Information Technology

Once a cookie is saved on your computer, it can be read by any website.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

An auditing team has found that passwords do not meet best business practices. Which of the following will MOST increase the security of the passwords?

A. Password Complexity B. Password Expiration C. Password Age D. Password Length E. Password History

Computer Science & Information Technology