Users will use the ________ to establish the right security for the database. For instance, a business manager may want to verify that databases received from outside the organization have macros disabled by default

A) Access Trust Center B) Office Button
C) Access Options D) Macro Settings

A

Computer Science & Information Technology

You might also like to view...

Using the User State Migration Tool, the source computer can be running Windows Vista or Windows 7 only

Indicate whether the statement is true or false

Computer Science & Information Technology

The purpose of a __________ is to produce a “fingerprint” of a file, message, or other block of data.

A. secret key B. digital signature C. keystream D. hash function

Computer Science & Information Technology