_______ is a database program.
A. Word
B. Access
C. PowerPoint
D. Outlook
Answer: B
You might also like to view...
In object-oriented design, the nouns found in the problem specification can be used to select the operations in the program.
Answer the following statement true (T) or false (F)
Which of the following is a secure protocol that can be used to protect IM and presence information?
A. Password Authentication Protocol (PAP) B. NT LAN Manager (NTLM) C. Extensible Message and Presence Protocol (XMPP) D. Challenge Authentication Protocol (CHAP)
Answer the following statements true (T) or false (F)
1. A widely used technique for pseudorandom number generation is an algorithm known as the linear congruential method. 2. A cryptographically secure pseudorandom bit generator is defined as one that passes the least significant bit test. 3. The security of Blum, Blum, Shub is based on the difficulty of factoring n. 4. The stream cipher is similar to the one-time pad with a difference being that a one-time pad uses a pseudorandom number stream and a stream cipher uses a genuine random number stream. 5. The longer the keyword the more difficult the cryptanalysis.
The advantage of using an inline ____________________ is an increase in execution speed.
Fill in the blank(s) with the appropriate word(s).