Which of the following Access objects cannot be exported to Excel?

A. Form
B. Report
C. Table
D. Macro


Answer: D

Computer Science & Information Technology

You might also like to view...

The purpose of a defense in depth strategy is:

a. To make protected assets difficult to find b. To ensure that protected assets are reachable c. To protect assets from unauthorized access d. To protect assets using a variety of controls

Computer Science & Information Technology

Which of the following allows an application to automatically execute code at regular time intervals?

a. Timer Enabled Event b. Interval Property c. Timer Event d. Timer control

Computer Science & Information Technology

Why is a basic understanding of Filesystem Hierarchy Standard (FHS) a valuable tool for Linux administrators and users?

What will be an ideal response?

Computer Science & Information Technology

A Web page may be generated ________ by using JavaScript commands to create the XHTML code when the script is interpreted

Fill in the blank(s) with correct word

Computer Science & Information Technology