To create an action query, click the ____ button from the Create tab in Access 2016.

A. Make-Table
B. Action Query
C. Query Design
D. Add New


Answer: C

Computer Science & Information Technology

You might also like to view...

Write a program where the destructors should be virtual. Explain.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is the block cipher used by most TCP/IP applications that use that type of cipher?

A. Rivest Cipher 4 (RC4) B. Advanced Encryption Standard (AES) C. Data Encryption Standard (DES) D. Rivest Shamir Aleman (RSA)

Computer Science & Information Technology

How are desktop and mobile operating systems similar?

a. Both are designed to work both on desktops and laptops, as well as smartphones and tablets. b. Both feature a graphical user interface (GUI). c. Both are optimized to work with limited memory and processing power

Computer Science & Information Technology

Separation of ____________________ is used to reduce the chance of an individual violating information security and breaching the confidentiality, integrity, or availability of information.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology