Read-only forward retrieval of data from an Access database is possible using the ____ class.
A. OleDbDataReader
B. ExecuteReader
C. SqlDataReader
D. DbReader
Answer: A
You might also like to view...
____ integrity is the rule that makes it possible for a DBMS to prevent records from being orphaned if a user attempts to change a primary key or delete a record in a table that has matching records in another table.
A. Join B. Referential C. Primary D. Relational
____________________ is a way that unauthorized users can obtain sensitive information by making assumptions based on the database's reactions or query responses to nonsensitive queries.
Fill in the blank(s) with the appropriate word(s).
Which security threat would be lessened by implementing a mantrap?
A) Shoulder surfing B) Social engineering C) Tailgating D) Phishing
With ____________________ functions, the definitions of the member functions are placed in the implementations file.
Fill in the blank(s) with the appropriate word(s).