Which of the following is NOT a method of controlling the Access user interface?
A) Controlling if the Ribbon will be visible
B) Controlling the way users navigate to the database
C) Setting a password on the database
D) Preventing users from editing certain Access objects
A
You might also like to view...
At most, how many comparisons are required to search a sorted vector of 1023 elements using the binary search algorithm?
a. 10 b. 15 c. 20 d. 30
A(n) ___________is a bit-for-bit copy of the data from all sectors of a hard disk.
Fill in the blank(s) with the appropriate word(s).
Match the shortcut keystrokes to the correct action.
A. Previous field of the current record B. Next field of the current record C. Current field of the previous record D. Last field of the last record E. First field of the current record F. Last field of the current record G. Current field of the next record H. First field of the first record
Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting?
A. The VoIP phone would request a new phone number from the unified communications server. B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown. C. The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls. D. The VoIP phone would request a different configuration from the unified communications server.