You use ____ around field names to distinguish them from function names or other types of values.
A. parentheses
B. quotation marks
C. square brackets
D. slashes
Answer: C
You might also like to view...
Routine procedures to ensure that everybody who accesses a system meets the company's guidelines for the assignment of trust are typically part of the ____ function.
A. system identity management B. network identity management C. user identity management D. automated identity management
Forms allow you to customize the way Access displays records by ____.
A. selecting particular fields B. specifying the field order C. adding field labels D. all of the above
Case-Based Critical Thinking QuestionsCase 1-1Alice was working on her company's Web site and had problems with inserting some images. Some of them were distorted; some were too big, so downloads took a long time. She asked her friend Sam for advice, checking in with him for answers to her questions.According to Sam, which of the following specify the dimensions of the area of a Web page where an image will be rendered?
A. depth and resolution B. space and color depth C. height and width D. pixel ratio and aspect ratio
Most NBA sensors can be deployed in ____ mode only, using the same connection methods (e.g., network tap, switch spanning port) as network-based IDPSs.
A. simple B. aggressive C. active D. passive