Fields that contain numbers that are not used in calculations should be set to ________

A) auto-number B) number C) short text D) long text

C

Computer Science & Information Technology

You might also like to view...

Which term is used when limiting the amount of network traffic a specific protocol or application is allowed to generate or consume, with the goal of keeping the remainder of the network's capacity free for other communications?

A. Load balancing B. Quality of service management C. Bandwidth throttling D. Utilization tracking

Computer Science & Information Technology

Describe the methods used in each of the following protocols to prevent a replay attack:

a. Kerberos authentication b. SET c. Electronic cash

Computer Science & Information Technology