When a ________ is named "autoexec," Access automatically runs or executes it each time the database is opened

A) macro
B) command
C) condition
D) comment


A

Computer Science & Information Technology

You might also like to view...

How does an access point know if a wireless data packet is intended for its network?

What will be an ideal response?

Computer Science & Information Technology

OCTAVE, a highly flexible assessment strategy, can be tailored to nearly any organization and can be very effective in identifying ________

A) areas where the organization is most likely to be affected by a disaster recovery B) areas where the organization is most likely to be affected by a disaster situation C) areas where the organization is most likely to be affected by backup procedures D) costs associated with disaster recovery

Computer Science & Information Technology

Application assessments determine the possible network security attacks that may occur on an organization's system.

a. true b. false

Computer Science & Information Technology

Each AWS region is composed of two or more locations that offer organizations the ability to operate production systems that are more highly available, fault tolerant, and scalable than would be possible using a single data center. What are these locations called?

A. Availability Zones B. Replication areas C. Geographic districts D. Compute centers

Computer Science & Information Technology