_________ can be restored from a backup
A) Tables
B) Queries
C) Macros
D) All database objects
D
Computer Science & Information Technology
You might also like to view...
The first step in the ____ process is to equate the EBK role definitions with whatever the organization presently calls that role.
A. mapping B. discovery C. implementation D. evaluation
Computer Science & Information Technology
An IP address of 192.168.18.73/28 has what network ID?
a. 192.168.16.0 b. 192.168.18.64 c. 192.168.18.32 d. 192.168.18.0
Computer Science & Information Technology
In most YaST installation dialogs, the left panel displays an overview of the installation status and the right panel displays the current installation step.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The only sequence of symbols that may not occur within a CDATA section is _____ because this is the marker ending a CDATA section.
A. ?> B. ?** C. ?)) D. ?<
Computer Science & Information Technology