Users will use the ________ to establish the right security for the database. For instance, a business manager may want to verify that databases received from outside the organization have macros disabled by default
A) Access Trust Center B) Office Button
C) Access Options D) Macro Settings
A
Computer Science & Information Technology
You might also like to view...
Using the User State Migration Tool, the source computer can be running Windows Vista or Windows 7 only
Indicate whether the statement is true or false
Computer Science & Information Technology
The purpose of a __________ is to produce a “fingerprint” of a file, message, or other block of data.
A. secret key B. digital signature C. keystream D. hash function
Computer Science & Information Technology