When adding records in a form, the data is stored in ________
A) a table
B) a query
C) a report
D) the form
A
You might also like to view...
Header and footer elements such as worksheet name, current date, and time are _____ elements.
A. descriptive B. dynamic C. impact D. required
The default event-handler method for CheckBox objects is ____________.
Fill in the blank(s) with the appropriate word(s).
Since the first Copyright Act was passed in 1790
a. Congress has repeatedly increased the number of years of copyright protection. b. Congress has made more kinds of intellectual property protected under copyright. c. Congress has attempted to reconcile American copyright law with European copyright law. d. All of the above e. None of the above
Answer the following statements true (T) or false (F)
6. Organizational security objectives identify what IT security outcomes should be achieved. 7. The assignment of responsibilities relating to the management of IT security and the organizational infrastructure is not addressed in a corporate security policy. 8. Organizational security policies identify what needs to be done. 9. It is not critical that an organization’s IT security policy have full approval or buy-in by senior management. 9. It is not critical that an organization’s IT security policy have full approval or buy-in by senior management. 10. Because the responsibility for IT security is shared across the organization, there is a risk of inconsistent implementation of security and a loss of central monitoring and control.