When an underlying table designates a field as a lookup field, Access inserts a(n) ________ for this field

Fill in the blank(s) with correct word


combo box

Computer Science & Information Technology

You might also like to view...

Which of the following should be done to harden a system?

A) Turn off unused services. B) Turn on the Windows port filters. C) Apply the latest security patches and fixes. D) All of the above

Computer Science & Information Technology

Google is an example of a search engine

Indicate whether the statement is true or false

Computer Science & Information Technology

To a separate a cell into multiple cells, you click the Split Cells button in the:

A) Merge group on the Divide tab. B) Split group on the Layout tab. C) Merge group on the Layout tab. D) Split group on the Divide tab.

Computer Science & Information Technology

A security manager is discussing change in the security posture of the network, if a proposed application is approved for deployment. Which of the following is the MOST important the security manager must rely upon to help make this determination?

A. Ports used by new application B. Protocols/services used by new application C. Approved configuration items D. Current baseline configuration

Computer Science & Information Technology