By using the _________ method to create subreports, you can create and alter the subreport before adding it to the main report

Fill in the blank(s) with correct word


drag-and-drop

Computer Science & Information Technology

You might also like to view...

Each repetition of a loop body is called ____________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Why does it make sense to destruct the child object before the parent object? Explain.

What will be an ideal response?

Computer Science & Information Technology

Assume you have three int variables: x = 2, y = 6, and z. Choose the value of z in the following expression: z = (y / x > 0) ? x : y;.

A. 2 B. 3 C. 4 D. 6

Computer Science & Information Technology

What professional level security certification did the "International Information Systems Security Certification Consortium" (ISC2) develop?

A. Security+ B. OSSTMM Professional Security Tester (OPST) C. Certified Information Systems Security Professional (CISSP) D. Certified Ethical Hacker (CEH)

Computer Science & Information Technology