An Access view that displays the underlying view of an object.
A. Design
B. Field
C. Outline
D. Datasheet
A. Design
Computer Science & Information Technology
You might also like to view...
Threat assessment, security requirements, and secure architecture are security practices that are applied at what business function level of the SAMM?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
_________ is the elapsed time between the submission of a request until the response begins to appear as output.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The Normal style defines line spacing to single and does not insert any additional blank space between lines when you press the RETURN key.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Storing duplicate data in more than one table is called data ________
Fill in the blank(s) with correct word
Computer Science & Information Technology