What is a user permitted to do when using an Access Database Executable file?

A. Modify data
B. Make changes to the forms and/or reports
C. Create new forms and/or reports
D. Modify VBA code


Answer: A

Computer Science & Information Technology

You might also like to view...

DES uses which of the following encryption key length?

a. 56 bit b. 128 bit c. 192 bit d. 256 bit

Computer Science & Information Technology

Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar errors.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is NOT a type of animation software?  

A. Autodesk Maya B. Adobe Reader C. Microsoft Silverlight D. Adobe Flash

Computer Science & Information Technology

________ software, such as Tor, will help mask your IP address from websites.

A. Anonymity B. Public domain C. Do not track D. DRM

Computer Science & Information Technology