The border to the right of a column is the ____.
A. column boundary
B. table resize handle
C. row boundary
D. table boundary
Answer: A
Computer Science & Information Technology
You might also like to view...
SQL injection attacks are isolated to custom applications, so administrators can prevent them.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
By default, records in a query are displayed in primary key field order, even if that field is NOT included in the query
Indicate whether the statement is true or false
Computer Science & Information Technology
A ____ operates at layer 3 of the OSI reference model. It interprets the Network layer protocol and makes forwarding decisions based on the layer 3 address.
A. switch B. router C. bridge D. hub
Computer Science & Information Technology
A cell containing a formula that references other cells is said to have ____.
A. dependents B. calculations C. precedents D. references
Computer Science & Information Technology