____________________ values are never allowed by Access in the primary key field.

Fill in the blank(s) with the appropriate word(s).


Duplicate

Computer Science & Information Technology

You might also like to view...

Which of the following statements about arrays are true?

A. An array is a group of variables containing values that all have the same type. B. Elements are located by index. C. The length of an array c is determined by the expression c.length();. D. The zeroth element of array c is specified by c[0]. a. A, C, D. b. A, B, D. c. C, D. d. A, B, C, D.

Computer Science & Information Technology

Select the true statement from those listed below.

a.

Which type of BlueTooth attack accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers?

A. Bluejacking B. Bluesurfing C. Bluephising D. Bluesnarfing

Computer Science & Information Technology

Match the following terms with their meanings: I. data validation II. validation rule III. input mask IV. lookup field A. enables you to restrict the data being input into a field by specifying the exact format of the data entry B. restricts the data values that can be entered into a field C. provides the user with a finite list of values to choose from in a menu D. a set of constraints or rules

that help control how data is entered into a field What will be an ideal response?

Computer Science & Information Technology