You must be in _____ mode to encrypt a database file.

A. Query
B. Exclusive
C. Layout
D. Wizard

Answer: B

Computer Science & Information Technology

You might also like to view...

When placed early in a search, which command is most effective at reducing search execution time?

A. dedup B. rename C. sort - D. fields +

Computer Science & Information Technology

Give five types of hardware resource and five types of data or software resource that can usefully be shared. Give examples of their sharing as it occurs in distributed systems.

What will be an ideal response?

Computer Science & Information Technology