Answers

DS

Answered

_________ is an attack by a programmer developing a system.

A) DoS
B) A phishing attack
C) A Trojan horse
D) Virus

On Jul 06, 2024


C
DS

Answered

________ CRM systems are hosted by an external vendor in the vendor's data center.

A) On-demand
B) On-premise
C) Mobile
D) Social

On Jul 05, 2024


A
DS

Answered

The two types of control layouts Access provides for forms are stacked and _____.

A) stepped
B) tabular
C) datasheet
D) subform

On Jun 06, 2024


B
DS

Answered

Microsoft Office is an example of a software suite.

On Jun 03, 2024


True
DS

Answered

Google Chromebook is a ________.

A) fat client laptop
B) fat client microprocessor
C) thin client laptop
D) thin client microprocessor

On May 07, 2024


C
DS

Answered

Which is NOT a concern expressed by advocates over reservations about Axon's technology?

A) The machines will learn from the police's labeling of footage, rather than civilians'.
B) Video footage only records civilians from the police's point of view.
C) Automated threat assessments may transform policing for the worse, not better.
D) Machine learning will not be able to identify objects such as stop signs, guns, and license plates, only civilians' faces.

On May 04, 2024


D
DS

Answered

Flexe is the _______ of warehousing.

A) Airbnb
B) Amazon
C) Google
D) Twitter

On May 02, 2024


A
DS

Answered

You can trust a database or a folder using the features in the _____ category of the Access Options dialog box.

A) Current Database
B) Trust Center
C) Client Settings
D) General

On May 01, 2024


B
DS

Answered

Which argument of the MessageBox macro action determines the icon in the message dialog box?

A) Message
B) View
C) Title
D) Type

On Apr 30, 2024


D
DS

Answered

Add-on instructions are special purpose instructions that can be purchased and added to the instruction set.

On Apr 28, 2024


False