In Access, an input mask can be used as a(n) ________ rule, which limits or controls what users can enter in a field

Fill in the blank(s) with correct word


validation

Computer Science & Information Technology

You might also like to view...

Explain what is meant by the Spot-the-difference approach to troubleshooting.

What will be an ideal response?

Computer Science & Information Technology

____ variables are accessible throughout a Ruby program and have an unlimited scope. Every class in the program is allowed to access them.

A. Local B. Global C. Instance D. Class

Computer Science & Information Technology

Which operating system, when added as a virtual machine, requires a separate, licensed copy?

A. Microsoft Windows B. Ubuntu Linux C. FreeDOS D. OpenBSD

Computer Science & Information Technology

Which of the following is an impediment to productivity?

A) cyber crime B) information C) misuse of technology D) security procedures E) training

Computer Science & Information Technology