Fields that contain numbers that are not used in calculations should be set to ________
A) auto-number B) number C) short text D) long text
C
Computer Science & Information Technology
You might also like to view...
Which term is used when limiting the amount of network traffic a specific protocol or application is allowed to generate or consume, with the goal of keeping the remainder of the network's capacity free for other communications?
A. Load balancing B. Quality of service management C. Bandwidth throttling D. Utilization tracking
Computer Science & Information Technology
Describe the methods used in each of the following protocols to prevent a replay attack:
a. Kerberos authentication b. SET c. Electronic cash
Computer Science & Information Technology