By restricting access to the tables in Datasheet view, the ________ of the data and structure of the data is not at risk

Fill in the blank(s) with correct word


integrity

Computer Science & Information Technology

You might also like to view...

Where are PowerPivot tools located on the Ribbon?

A) Formulas tab B) Data tab C) Review tab D) Insert tab

Computer Science & Information Technology

Common input devices include the keyboard, ____, and integrated video cameras.

A. printer B. mouse C. speaker D. monitor

Computer Science & Information Technology

The process of converting vector graphics to bitmap images for editing and printing them is called ____.

A. resolving B. iconization C. dithering D. rasterizing

Computer Science & Information Technology

If you are not concerned with replacing outdated image files, you should cloak the ____ folder of a website to save time when synchronizing files.

A. root B. parent C. child D. assets

Computer Science & Information Technology