All of the following applications can be used to store data sources EXCEPT ________
A) OneNote
B) Outlook
C) Word
D) Excel
A
Computer Science & Information Technology
You might also like to view...
Which of the following statements doubles the value stored in answer?
A) answer += 2; B) answer *= 2; C) answer = answer * 2; D) All three of the above E) Both B and C, but not A
Computer Science & Information Technology
What are the steps to tune performance?
What will be an ideal response?
Computer Science & Information Technology
When InPrivate Browsing is turned on, a blue icon appears in the address bar
Indicate whether the statement is true or false
Computer Science & Information Technology
____ is a symmetric key-encryption technique that will replace the commonly used DES standard.
A. AES B. RC2 C. IDEA D. Blowfish
Computer Science & Information Technology