Subforms can be created using ________, queries, or forms.
Fill in the blank(s) with the appropriate word(s).
tables
You might also like to view...
The ____ image file format was created specifically for Web graphics, and it produces high-quality images with small file sizes.
A. JPEG B. GIF C. PNG D. XML
The lowest layer of the IEEE 802 reference model is the __________ layer.
Fill in the blank(s) with the appropriate word(s).
What is secondary storage used for?
a. storing data and software permanently or until explicitly deleted by the user b. it is the part of internal memory that can be accessed by the user for writing programs c. storing often used instructions during the fetch-execute cycle d. to double the word size of the microprocessor
Trojan horse viruses are difficult to detect because ________.
a) they hide within the system until a certain time or condition is met b) they allow a malicious user access to the system c) they do not require any user action to be activated d) they appear to be legitimate programs