What is a user permitted to do when using an Access Database Executable file?
A. Modify data
B. Make changes to the forms and/or reports
C. Create new forms and/or reports
D. Modify VBA code
Answer: A
Computer Science & Information Technology
You might also like to view...
DES uses which of the following encryption key length?
a. 56 bit b. 128 bit c. 192 bit d. 256 bit
Computer Science & Information Technology
Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar errors.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following is NOT a type of animation software?
A. Autodesk Maya B. Adobe Reader C. Microsoft Silverlight D. Adobe Flash
Computer Science & Information Technology
________ software, such as Tor, will help mask your IP address from websites.
A. Anonymity B. Public domain C. Do not track D. DRM
Computer Science & Information Technology