A series of commands that are executed without your knowledge is a typical attribute of a ___________ virus
a. boot-sector c. time bomb
b. script d. encryption
B
You might also like to view...
It is wise to plan your database before creating the tables and entering data
Indicate whether the statement is true or false
In a Web service application, a Do-Until block should be used to catch an exception that could occur if the program cannot connect to the Web service.
Answer the following statement true (T) or false (F)
What type of software automatically follows hyperlinks from one document to the next around the Web?
A. bot B. indexer C. linker D. compiler
When you ________, you select a value in a record and Access filters the records that contain only the values that match what you have selected
A) use the Find command B) use the Replace command C) use the Navigation bar D) filter by selection