Records deleted using a Delete query may not be restored by using the ____ command.

A. Redo
B. Undo
C. Unhide
D. Select


Answer: B

Computer Science & Information Technology

You might also like to view...

For the following code, which statement is not true?

``` public class Circle { private double radius; public double x; private double y; } ``` a. The y field is available to code written outside the Circle class. b. The radius field is not available to code written outside the Circle class. c. The radius, x, and y fields are members of the Circle class. d. The x field is available to code that is written outside the Circle class.

Computer Science & Information Technology

________ define the type and contents of a security descriptor.

A) SACLs B) Flags C) Owners D) DACLs

Computer Science & Information Technology

Which approach to stateful protocol analysis involves detection of the protocol in use, followed by activation of analyzers that can identify applications not using standard ports?

A. Protocol state tracking B. IP packet reassembly C. Traffic rate monitoring D. Dynamic Application layer protocol analysis

Computer Science & Information Technology

The feature that allows you to move text by selecting it and using your mouse to move it to a new location is called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology