You can make a(n) ________ copy of a database file to protect your database against loss or damage
A) backup B) secure C) master D) restore
A
Computer Science & Information Technology
You might also like to view...
Proven cases of real vulnerabilities can be considered vulnerability __________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
List six objectives the analyst pursues in designing system output.
What will be an ideal response?
Computer Science & Information Technology