Rules that determine who can share network resources are referred to as:
A) protocols B) rules of access C) permissions D) public sharing
C
Computer Science & Information Technology
You might also like to view...
Access can link to a table in all of the following EXCEPT:
A) another Access database. B) SQL and Oracle databases. C) an Excel spreadsheet. D) a Word table.
Computer Science & Information Technology
When a called function completes its task, it normally
a) terminates program execution normally b) aborts program execution c) logs its results d) returns to the calling function
Computer Science & Information Technology