A(n) ________ is a set of constraints or rules that help control how data is entered into a field

A) Input mask B) Lookup list C) Data validation D) Default value

C

Computer Science & Information Technology

You might also like to view...

Initialize each of the five elements of one-dimensional integer array g to 8.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____ process includes encapsulation, transmission, and decapsulation of packets.

A. encryption B. authentication C. tunneling D. packaging

Computer Science & Information Technology