In Datasheet view, the ________ icon that appears in the record selector indicates that the record is being modified

A) pencil B) arrow C) pointer D) eraser

A

Computer Science & Information Technology

You might also like to view...

Which of the following is not true about Internet fraud?

A) Internet fraud accounts for over 90% of all consumer-fraud complaints to the Federal Trade Commission. B) One example is the Nigerian letter scam where you receive an e-mail from someone claiming to have a large amount of money that needs to be released from an account if you can send money to help transfer the money. C) Other types of Internet security threats include phishing, pharming, and Trojan horses. D) Spam that promotes a product or cause is illegal, as well as a nuisance.

Computer Science & Information Technology

Which of the following statements best describes a stateful packet inspection firewall?

a. It examines each packet against a set of criteria. b. It can keep track of the status of the connection in addition to examining each packet. c. It works by examining the client application to determine if traffic is permitted. d. It authenticates the client before examining the application.

Computer Science & Information Technology