The names and addresses in a data source file created with Word are displayed in ________
A) columns only
B) a tabbed list
C) a bulleted list
D) a table
D
Computer Science & Information Technology
You might also like to view...
Explain the two logical requirements that a data security solution has to satisfy.
What will be an ideal response?
Computer Science & Information Technology
Running ________ helps improve the efficiency of a computer by regrouping related pieces of files together
Fill in the blank(s) with correct word
Computer Science & Information Technology
The Update query is used to check the record set of an existing table
Indicate whether the statement is true or false
Computer Science & Information Technology
Named after two protocols, _________________ is really several subprotocols, designed to work together.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology