To make changes to a query, the user must open the query in ________ View

Fill in the blank(s) with correct word


Design

Computer Science & Information Technology

You might also like to view...

Describe the security measures provided by Microsoft Office Access or Oracle DBMS.

What will be an ideal response?

Computer Science & Information Technology

Computers use special computer codes that are based on ones (1s) and ____.

A. bit B. zeros C. twos D. letters

Computer Science & Information Technology

In which two situations do decision tables work best?

What will be an ideal response?

Computer Science & Information Technology

Give a concise, general definition of a network threat—the way you would explain it to nontechnical management.

What will be an ideal response?

Computer Science & Information Technology