Question: 1. In Microsoft Access, we use tables in a database for: a. Data entry. b. Data storage. c. Data retrieval. d. Two of these choices
1. In Microsoft Access, we use tables in a database for:
a. Data entry.
b. Data storage.
c. Data retrieval.
d. Two of these choices are correct.
2. The most common security threats for wireless LANs include:
a. social engineering.
b. system malfunction.
c. man-in-the-middle.
d. virus.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
