By restricting access to the tables in Datasheet view, the ________ of the data and structure of the data is not at risk
Fill in the blank(s) with correct word
integrity
Computer Science & Information Technology
You might also like to view...
Where are PowerPivot tools located on the Ribbon?
A) Formulas tab B) Data tab C) Review tab D) Insert tab
Computer Science & Information Technology
Common input devices include the keyboard, ____, and integrated video cameras.
A. printer B. mouse C. speaker D. monitor
Computer Science & Information Technology
The process of converting vector graphics to bitmap images for editing and printing them is called ____.
A. resolving B. iconization C. dithering D. rasterizing
Computer Science & Information Technology
If you are not concerned with replacing outdated image files, you should cloak the ____ folder of a website to save time when synchronizing files.
A. root B. parent C. child D. assets
Computer Science & Information Technology