Which of the following is NOT an example of an Access object?

A) Table B) Report C) Sort D) Query


C

Computer Science & Information Technology

You might also like to view...

Access lists are which of the following? (Select all that apply.)

a. A basic form of firewall protection b. Basically a firewall c. An improvement over firewall protection d. A replacement for proxy servers

Computer Science & Information Technology

The contain keyword tells browsers to scale the image so that all of the image is completely contained within the element.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is NOT an actual gallery in PowerPoint 2013?

A) Colors gallery B) Fonts gallery C) Effects gallery D) Page Setup gallery

Computer Science & Information Technology

Processes can initiate numerous connections, called ____________________, to files on the filesystem in addition to standard input, standard output, and standard error.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology