When an underlying table designates a field as a lookup field, Access inserts a(n) ________ for this field
Fill in the blank(s) with correct word
combo box
You might also like to view...
Which of the following should be done to harden a system?
A) Turn off unused services. B) Turn on the Windows port filters. C) Apply the latest security patches and fixes. D) All of the above
Google is an example of a search engine
Indicate whether the statement is true or false
To a separate a cell into multiple cells, you click the Split Cells button in the:
A) Merge group on the Divide tab. B) Split group on the Layout tab. C) Merge group on the Layout tab. D) Split group on the Divide tab.
A security manager is discussing change in the security posture of the network, if a proposed application is approved for deployment. Which of the following is the MOST important the security manager must rely upon to help make this determination?
A. Ports used by new application B. Protocols/services used by new application C. Approved configuration items D. Current baseline configuration