Read-only forward retrieval of data from an Access database is possible using the ____ class.

A. OleDbDataReader
B. ExecuteReader
C. SqlDataReader
D. DbReader


Answer: A

Computer Science & Information Technology

You might also like to view...

____ integrity is the rule that makes it possible for a DBMS to prevent records from being orphaned if a user attempts to change a primary key or delete a record in a table that has matching records in another table.

A. Join B. Referential C. Primary D. Relational

Computer Science & Information Technology

____________________ is a way that unauthorized users can obtain sensitive information by making assumptions based on the database's reactions or query responses to nonsensitive queries.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which security threat would be lessened by implementing a mantrap?

A) Shoulder surfing B) Social engineering C) Tailgating D) Phishing

Computer Science & Information Technology

With ____________________ functions, the definitions of the member functions are placed in the implementations file.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology