The Trust Center is a tool for users to add ________ that the user knows are secure to minimize security breaches within an Access database

A) user names B) Web addresses C) locations D) network paths

C

Computer Science & Information Technology

You might also like to view...

The OSPF routing protocol uses which of the following to verify that a link between two routers is active and the routers are communicating?

a. LSAs b. “Hello” packets c. ARP messages d. ping

Computer Science & Information Technology

Read the following sentence and key the correct terminal punctuation mark in the blank.You can cross the English Channel by ferry or by rail_____?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology