What type of form displays records in a tabular layout similar to a table's Datasheet view but has more editing options, such as adding graphics and buttons, than a datasheet?

A) compound form B) subform
C) multiple Items Form D) split Form


C

Computer Science & Information Technology

You might also like to view...

State which of the following statements are true and which are false. If a statement is false, explain why.

1) A friend function of a class template must be a function-template specialization. 2) If several class-template specializations are generated from a single class template with a single static data member, each of the class-template specializations shares a single copy of the class template’s static data member. 3) Only existing operators can be overloaded. 4) Data members or member functions declared with access specifier private are accessible to member functions of the class in which they are declared. 5) Variables declared in the body of a particular member function are known as data members and can be used in all member functions of the class.

Computer Science & Information Technology

Match the following elements of a Safari window with their functions.

A. Provides access to most of the browser's features B. Displays information about the page that is loading C. Appears along the bottom of a page if the page is wider than the window's viewable area D. Indicates your relative position within the Web page E. Appears along the right side of a page if the page is longer than the window's viewable area

Computer Science & Information Technology

The objective of _____ is to gather data about project usability, costs, benefits, and schedules.

A. mediation B. fact-finding C. project execution D. project maintenance

Computer Science & Information Technology

Matt, the security administrator, notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks on to the database?

A. OS hardening B. Application patch management C. Error and exception handling D. Input validation

Computer Science & Information Technology