You can make a(n) ________ copy of a database file to protect your database against loss or damage

A) backup B) secure C) master D) restore

A

Computer Science & Information Technology

You might also like to view...

Proven cases of real vulnerabilities can be considered vulnerability __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

List six objectives the analyst pursues in designing system output.

What will be an ideal response?

Computer Science & Information Technology