_______ is a database program.

A. Word
B. Access
C. PowerPoint
D. Outlook


Answer: B

Computer Science & Information Technology

You might also like to view...

In object-oriented design, the nouns found in the problem specification can be used to select the operations in the program.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is a secure protocol that can be used to protect IM and presence information?

A. Password Authentication Protocol (PAP) B. NT LAN Manager (NTLM) C. Extensible Message and Presence Protocol (XMPP) D. Challenge Authentication Protocol (CHAP)

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A widely used technique for pseudorandom number generation is an algorithm known as the linear congruential method. 2. A cryptographically secure pseudorandom bit generator is defined as one that passes the least significant bit test. 3. The security of Blum, Blum, Shub is based on the difficulty of factoring n. 4. The stream cipher is similar to the one-time pad with a difference being that a one-time pad uses a pseudorandom number stream and a stream cipher uses a genuine random number stream. 5. The longer the keyword the more difficult the cryptanalysis.

Computer Science & Information Technology

The advantage of using an inline ____________________ is an increase in execution speed.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology