Which of the following forces you to enter the phone number in a consistent manner in the database table?
A) Input mask
B) Default value
C) Lookup list
D) Validation rule
A
Computer Science & Information Technology
You might also like to view...
Which of the following scanning technique involves resetting the TCP connection between the client and the server abruptly before completion of the three-way handshake signals?
A. Stealth Scan B. TCP Connect Scan C. Inverse TCP Flag Scan D. Xmas Scan
Computer Science & Information Technology
The values or variables listed in the function declaration are called _________ to the function.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology