The value of the expression (int) 27.6 evaluates to:
a. 28
b. 27
c. 26
d. None of the above.
B
You might also like to view...
A secret message has been encrypted with a key that is as long as the message itself. The key will be used for only this message. The type of encryption used here is:
a. Running key cipher b. One-time cipher c. One-time pad d. Diffie-Hellman
The first widely used graphical web browser was developed at:
a. CERN b. NCSA c. NSF d. ARPA
If you misspell a field name in a calculated field of a query and then run the query, Access will:
A) substitute a value of NULL for the field and proceed with the calculation. B) display a dialog box asking for a value for the field. C) substitute a zero value for the field and proceed with the calculation. D) stop running the query and produce no results.
What technology could be used to locate lost pets?
A) Key card B) RFID C) Hardware token D) USS