In Access, use an input mask whenever you want users to enter data in a specific way
Indicate whether the statement is true or false
TRUE
Computer Science & Information Technology
You might also like to view...
What command brings up the System Configuration utility so that the UAC controls can be accessed?
A) winconfig B) config C) sysconfig D) msconfig
Computer Science & Information Technology
________ is used to send text messages between mobile devices.
a. SMS b. MMS c. Social media d. CRM
Computer Science & Information Technology
Which of the following would be used to allow a subset of traffic from a wireless network to an internal network?
A. Access control list B. 802.1X C. Port security D. Load balancers
Computer Science & Information Technology
A(n) ____ consists of four groups of numbers, each separated by periods, or dots.
A. domain address B. client address C. web address D. IP address
Computer Science & Information Technology