All of the following applications can be used to store data sources EXCEPT ________

A) OneNote
B) Outlook
C) Word
D) Excel


A

Computer Science & Information Technology

You might also like to view...

Which of the following statements doubles the value stored in answer?

A) answer += 2; B) answer *= 2; C) answer = answer * 2; D) All three of the above E) Both B and C, but not A

Computer Science & Information Technology

What are the steps to tune performance?

What will be an ideal response?

Computer Science & Information Technology

When InPrivate Browsing is turned on, a blue icon appears in the address bar

Indicate whether the statement is true or false

Computer Science & Information Technology

____ is a symmetric key-encryption technique that will replace the commonly used DES standard.

A. AES B. RC2 C. IDEA D. Blowfish

Computer Science & Information Technology