All of the following are examples of steps in adding fields to a select query EXCEPT:

A) click on the 'add field' icon in the Design View ribbon.
B) click the dropdown arrow and select a field from the dropdown list.
C) click a field in the table and drag to the Design View of the query.
D) click in the first row of any column in the design grid.


A

Computer Science & Information Technology

You might also like to view...

Which of the following refers to a server or client that Kerberos can assign tickets to?

A) Realm B) Principal C) Authentication D) Session key

Computer Science & Information Technology

The price you are charged if you sign up for a paid sponsor or ad program and a visitor clicks on a link to your website.

a. CPL b. CTR c. CPM d. CPC

Computer Science & Information Technology

What are data warehousing and data mining? How do businesses use these tools?

What will be an ideal response?

Computer Science & Information Technology

One way to limit the effect of an untrusted program is confinement: controlling what processes have access to the untrusted program and what access the program has to other processes and data. Explain how confinement would apply to the earlier example of the program that computes the sum of the integers 1 to 10.

What will be an ideal response?

Computer Science & Information Technology