_________ can be restored from a backup

A) Tables
B) Queries
C) Macros
D) All database objects


D

Computer Science & Information Technology

You might also like to view...

The first step in the ____ process is to equate the EBK role definitions with whatever the organization presently calls that role.

A. mapping B. discovery C. implementation D. evaluation

Computer Science & Information Technology

An IP address of 192.168.18.73/28 has what network ID?

a. 192.168.16.0 b. 192.168.18.64 c. 192.168.18.32 d. 192.168.18.0

Computer Science & Information Technology

In most YaST installation dialogs, the left panel displays an overview of the installation status and the right panel displays the current installation step.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The only sequence of symbols that may not occur within a CDATA section is _____ because this is the marker ending a CDATA section.

A. ?> B. ?** C. ?)) D. ?<

Computer Science & Information Technology