Anytime you type a(n) ____ followed by a letter, a list of valid functions beginning with that letter appears.

A. dollar sign
B. plus sign
C. equal sign
D. comma


Answer: C

Computer Science & Information Technology

You might also like to view...

A key created from the AutoNumber data type could be used as a ________ key as long as the user never sees the AutoNumber

A) surrogate B) primary C) concatenated D) foreign

Computer Science & Information Technology

________ describes a type of API that allows applications to sit on different hosts and communicate using HTTP messages that transfer data over the API

A) ACI B) ARU C) PURL D) REST

Computer Science & Information Technology

Your company has an intrusion detection system (IDS) monitoring traffic between the Internet and the company's internal network. The IDS logged an attack attempt from a remote IP address. Two months later, the attacker successfully compromised the network. Which of the following MOST likely occurred?

A. The IDS generated too many false negatives. B. No one was reviewing the IDS event logs. C. The IDS generated too many false positives. D. The attack occurred during off hours or a holiday.

Computer Science & Information Technology

Where do you enter a contact's name, address, phone number, and other appropriate information?

A. Signatures and Stationery dialog box B. Contact window C. New Member dialog box D. Edit Contact dialog box

Computer Science & Information Technology