The names and addresses in a data source file created with Word are displayed in ________

A) columns only
B) a tabbed list
C) a bulleted list
D) a table


D

Computer Science & Information Technology

You might also like to view...

Explain the two logical requirements that a data security solution has to satisfy.

What will be an ideal response?

Computer Science & Information Technology

Running ________ helps improve the efficiency of a computer by regrouping related pieces of files together

Fill in the blank(s) with correct word

Computer Science & Information Technology

The Update query is used to check the record set of an existing table

Indicate whether the statement is true or false

Computer Science & Information Technology

Named after two protocols, _________________ is really several subprotocols, designed to work together.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology