Which of the following is NOT a method of controlling the Access user interface?

A) Controlling if the Ribbon will be visible
B) Controlling the way users navigate to the database
C) Setting a password on the database
D) Preventing users from editing certain Access objects


A

Computer Science & Information Technology

You might also like to view...

At most, how many comparisons are required to search a sorted vector of 1023 elements using the binary search algorithm?

a. 10 b. 15 c. 20 d. 30

Computer Science & Information Technology

A(n) ___________is a bit-for-bit copy of the data from all sectors of a hard disk.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match the shortcut keystrokes to the correct action.

A. Previous field of the current record B. Next field of the current record C. Current field of the previous record D. Last field of the last record E. First field of the current record F. Last field of the current record G. Current field of the next record H. First field of the first record

Computer Science & Information Technology

Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting?

A. The VoIP phone would request a new phone number from the unified communications server. B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown. C. The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls. D. The VoIP phone would request a different configuration from the unified communications server.

Computer Science & Information Technology