When you use the Database Splitter tool, it splits a database into two files: ________

A) major and minor
B) primary and secondary
C) independent and dependent
D) front-end and back-end

D

Computer Science & Information Technology

You might also like to view...

After you select a table style, you can control what the style formats. The Table Style Options group contains check boxes to select specific format actions in a table

Indicate whether the statement is true or false

Computer Science & Information Technology

When an organization has a properly implemented enterprise risk management (ERM), what is the tool used to list and categorize each discovered or encountered risk?

A. Cost/benefit equation B. Delphi technique C. Risk register D. Threat model

Computer Science & Information Technology