In what situations can you get more accurate information on a form by ?using form fields other than text boxes? Name two types of fields you might use instead. 

What will be an ideal response?


Sometimes the information requested for a field is restricted to a small, discrete list-the names of a few credit cards, for instance. Asking users to type this information opens your form to the possibility that they'll misspell a word, use an abbreviation that your back-end system doesn't recognize, or simply enter data that's not within the acceptable parameters. Instead, you can use other types of form fields to present users with acceptable choices, and limit their options to those choices.?Any two of the following:option buttonsselection listscheck boxesslidersdata lists

Computer Science & Information Technology

You might also like to view...

A language called ____ was modified in 1995 and renamed Java.

A. Maple B. Spruce C. Oak D. Cherry

Computer Science & Information Technology

?In the Report Wizard of Microsoft Access 2016, the second dialog box lets you _____.

A. ?choose grouping levels to add to the report B. ?add fields from only one table in each report C. ?pin the reports to the taskbar D. ?access and retrieve Web pages from reports

Computer Science & Information Technology

Match each item with a statement below.

A. Inclusion of one data structure inside another data structure. B. Communications path that makes use of Internet-based hosts and servers to conduct data from one network station to another. C. Makes a network accessible to remote users who need dial-in access. D. The host encrypts traffic when it is generated; the data part of packets is encrypted, but not the headers. E. The device connecting the organization's networks and equipment to the Internet. F. Services purchased from a service provider that give the user dedicated use of a predefined bandwidth or data rate. G. The traffic is encrypted and decrypted in transit, somewhere between the source computer that generated it and its destination. H. VPN that links two or more networks. I. Commonly used by remote users who need to connect to a network using a dial-in modem connection.

Computer Science & Information Technology

What are the four processes encompassed by access control?

What will be an ideal response?

Computer Science & Information Technology