When adding records in a form, the data is stored in ________

A) a table
B) a query
C) a report
D) the form


A

Computer Science & Information Technology

You might also like to view...

Header and footer elements such as worksheet name, current date, and time are _____ elements.

A. descriptive B. dynamic C. impact D. required

Computer Science & Information Technology

The default event-handler method for CheckBox objects is ____________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Since the first Copyright Act was passed in 1790

a. Congress has repeatedly increased the number of years of copyright protection. b. Congress has made more kinds of intellectual property protected under copyright. c. Congress has attempted to reconcile American copyright law with European copyright law. d. All of the above e. None of the above

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

6. Organizational security objectives identify what IT security outcomes should be achieved. 7. The assignment of responsibilities relating to the management of IT security and the organizational infrastructure is not addressed in a corporate security policy. 8. Organizational security policies identify what needs to be done. 9. It is not critical that an organization’s IT security policy have full approval or buy-in by senior management. 9. It is not critical that an organization’s IT security policy have full approval or buy-in by senior management. 10. Because the responsibility for IT security is shared across the organization, there is a risk of inconsistent implementation of security and a loss of central monitoring and control.

Computer Science & Information Technology