To prevent unauthorized access to your database ________

A) encrypt it
B) use Database Splitter
C) keep it on a USB drive
D) create it with the External Data tab


A

Computer Science & Information Technology

You might also like to view...

Assume that inputFile references a Scanner object that was used to open a file. Which of the following while loops is the correct way to read data from the file until the end of the file is reached?

a. while (inputFile.nextLine == " ") { ... } b. while (inputFile != null) { ... } c. while (!inputFile.EOF) { ... } d. while (inputFile.hasNext()) { ... }

Computer Science & Information Technology

The sqrt function

a) is provided in the library header. b) returns the square of the argument c)returns the square root of the argument d) the argument type is int e) the return type is double.

Computer Science & Information Technology

When you want to add a condition to a Totals query, which option do you select from the Totals row list?

A) Group B) Where C) Condition D) When

Computer Science & Information Technology

The manner in which a movie moves from one clip to another is known as a(n):

A) caption B) exposure C) frame rate D) transition

Computer Science & Information Technology