Field ____ are data characteristics that dictate how Access stores, handles, and displays field data.

A. descriptions
B. names
C. properties
D. descriptors


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is true about Back Orifice?

A) It can be attached to any executable file. B) It does not show up in the task list. C) It is small and self-installing. D) All of the above

Computer Science & Information Technology

A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.

A. spam B. phishing C. DDoS D. sniff

Computer Science & Information Technology

Discuss in detail the importance of using culling and cut-ins during the CGI process. How does this save processor power?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is true about destructors?

A. They are called explicitly by the main programmer to destroy an object. B. The class programmer can choose any function name for a destructor. C. They are only called when the program comes to an end. D. They are often written to prevent memory leak from occurring.

Computer Science & Information Technology