In Access, use an input mask whenever you want users to enter data in a specific way

Indicate whether the statement is true or false


TRUE

Computer Science & Information Technology

You might also like to view...

What command brings up the System Configuration utility so that the UAC controls can be accessed?

A) winconfig B) config C) sysconfig D) msconfig

Computer Science & Information Technology

________ is used to send text messages between mobile devices.

a. SMS b. MMS c. Social media d. CRM

Computer Science & Information Technology

Which of the following would be used to allow a subset of traffic from a wireless network to an internal network?

A. Access control list B. 802.1X C. Port security D. Load balancers

Computer Science & Information Technology

A(n) ____ consists of four groups of numbers, each separated by periods, or dots.

A. domain address B. client address C. web address D. IP address

Computer Science & Information Technology