A ________ is a macro that is triggered by events, such as adding, updating, or deleting data within a table, form, or query

Fill in the blank(s) with correct word


data macro, Data Macro

Computer Science & Information Technology

You might also like to view...

While discussing the preliminary feasibility of a project, your colleague insists that figures used in economic feasibility be very accurate down to the last cent. His claim is appropriate and not uncommon.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A spin lock (see Bacon [2002]) is a boolean variable accessed via an atomic test-and-set instruction, which is used to obtain mutual exclusion. Would you use a spin lock to obtain mutual exclusion between threads on a single-processor computer?

What will be an ideal response?

Computer Science & Information Technology

The TCP and UDP protocols both exist at what layer of the OSI model?

a. Application b. Presentation c. Transport d. Network

Computer Science & Information Technology

The _______________ command creates "invisible" launch events.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology