What can you not easily do using a form?

A) Delete data B) Move data C) Edit data D) Enter data


B

Computer Science & Information Technology

You might also like to view...

To quotation marks used for command substitution (executing a command) is

a. "command" (double quotation marks) b. ' command ' (single quotation marks) c. ` command ` (single back quotation marks - grave accent) d. all of the above e. none of the above

Computer Science & Information Technology

Which of the following is a valid constant declaration?

a. const double 3.14 = pi; b. const integer taxDeduct = 500; c. const double discount = 0.10; d. const taxRate = 0.06; e. double bonusAmount = 500.00;

Computer Science & Information Technology

To successfully exploit a given system, an intruder must first obtain information about the database system itself.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The TCP/IP reference model has ____ layers that roughly correlate to the OSI's seven layers.

A. two B. four C. seven D. ten

Computer Science & Information Technology