A(n) ________ is a set of constraints or rules that help control how data is entered into a field
A) Input mask B) Lookup list C) Data validation D) Default value
C
Computer Science & Information Technology
You might also like to view...
Initialize each of the five elements of one-dimensional integer array g to 8.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The ____ process includes encapsulation, transmission, and decapsulation of packets.
A. encryption B. authentication C. tunneling D. packaging
Computer Science & Information Technology