Which type of control does a lookup field become in a form?
A) Combo box control
B) Bound control
C) Calculated control
D) Unbound control
A
Computer Science & Information Technology
You might also like to view...
Threat assessment, security requirements, and secure architecture are security practices that are applied at what business function level of the SAMM?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Explain the pros and cons of outsource contracting.
What will be an ideal response?
Computer Science & Information Technology
Three general approaches exist for dealing with deadlock: prevent, avoid, and __________ .
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
An HVAC unit is used to identify a person based on biological data
Indicate whether the statement is true or false
Computer Science & Information Technology