Explain how to get help as you enter expressions.

What will be an ideal response?


In Access 2010, the Expression Builder includes Help tools to guide you when entering expressions. As you begin to type an expression, Access displays a list of items such as table names and functions that you can use in the expression. This list of suggestions is called IntelliSense, and it helps you enter expressions quickly and accurately. While IntelliSense is displaying the names of items to include in an expression, you can click an item to display a QuickTip, a short description of the item. If you are entering a function, such as the IIf function, Access displays Quick Info to indicate the syntax of the function.

Computer Science & Information Technology

You might also like to view...

Under what process in the technical process group are the qualification requirements tested and documented?

A. Maintenance B. Integration C. Architectural design D. Requirements analysis

Computer Science & Information Technology

To keep a heading together with the paragraph that follows it check the keep with ________ box

Fill in the blank(s) with correct word

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. A defined sequence of steps that achieve an identified goal B. All the work involved in creating the products of the project and the processes used to create them C. The specific action that needs to be completed in order to achieve the project goal D. The people, equipment, or facilities that need to be assigned to a task in order to complete it E. The degree to which something meets an objective standard F. The probability that a task, resource, or cost is miscalculated in a way that creates a negative impact on the project G. The task(s) that dictate(s) the calculated finish date of the project H. The default is Gantt chart I. Must be completed before a certain task can be started J. Cannot be started until another task is completed K. A box in a network diagram L. A small box containing the name of a toolbar button

Computer Science & Information Technology

The part of the security policy that defines the appropriate use of company data is

A) The acceptable use part B) The physical access part C) The remote access part D) The emergency procedures part

Computer Science & Information Technology