To prevent users from making changes to a database, you can save it as a(n) ________ file

A) PDF
B) ACCDE
C) RTF
D) ACCDB


B

Computer Science & Information Technology

You might also like to view...

A _____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.

A. rampage B. mass-mailing C. denial of service D. stampede

Computer Science & Information Technology

Along with the processor, ____ capacity is the other most important factor in determining and comparing the power of the computer system.

A. ROM B. RAM C. CPU D. FSB

Computer Science & Information Technology

The character spacing options are found in the Font dialog box

Indicate whether the statement is true or false

Computer Science & Information Technology

A division-based layout uses

tag elements to divide a page into sections.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology