To prevent users from making changes to a database, you can save it as a(n) ________ file
A) PDF
B) ACCDE
C) RTF
D) ACCDB
B
Computer Science & Information Technology
You might also like to view...
A _____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.
A. rampage B. mass-mailing C. denial of service D. stampede
Computer Science & Information Technology
Along with the processor, ____ capacity is the other most important factor in determining and comparing the power of the computer system.
A. ROM B. RAM C. CPU D. FSB
Computer Science & Information Technology
The character spacing options are found in the Font dialog box
Indicate whether the statement is true or false
Computer Science & Information Technology
A division-based layout uses
Answer the following statement true (T) or false (F)
Computer Science & Information Technology