The border to the right of a column is the ____.

A. column boundary
B. table resize handle
C. row boundary
D. table boundary


Answer: A

Computer Science & Information Technology

You might also like to view...

SQL injection attacks are isolated to custom applications, so administrators can prevent them.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

By default, records in a query are displayed in primary key field order, even if that field is NOT included in the query

Indicate whether the statement is true or false

Computer Science & Information Technology

A ____ operates at layer 3 of the OSI reference model. It interprets the Network layer protocol and makes forwarding decisions based on the layer 3 address.

A. switch B. router C. bridge D. hub

Computer Science & Information Technology

A cell containing a formula that references other cells is said to have ____.

A. dependents B. calculations C. precedents D. references

Computer Science & Information Technology