When creating a form, Access might automatically add a(n) ________ if more than one table is related

Fill in the blank(s) with correct word


subform

Computer Science & Information Technology

You might also like to view...

Which of the following statements about the layered security approach is true?

A) The perimeter is secured, but the systems within the perimeter are vulnerable. B) The systems within the perimeter are secured, but the perimeter is vulnerable. C) Both the perimeter and the individual systems within the perimeter are secured. D) Both the perimeter and the individual systems within the perimeter are vulnerable.

Computer Science & Information Technology

Computer game boxes and bar code scanners are examples of appliances

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ displays a list of shapes, including pictures and text boxes, located on the current page

Fill in the blank(s) with correct word

Computer Science & Information Technology

Flickr is an online photo-sharing Web site where users can upload, share, and tag ____.

A. photos B. e-mail messages C. videos D. blog posts

Computer Science & Information Technology