To help Access determine what can be entered and stored in a field, select an appropriate ________ in Design view
Fill in the blank(s) with correct word
data type
Computer Science & Information Technology
You might also like to view...
Privilege escalation is used in computer programs to bypass normal authentication
Indicate whether the statement is true or false
Computer Science & Information Technology
____ is a third-generation network security analysis tool developed by Advanced Research Corporation?
A. ?Cheops B. ?Strobe C. ?SAINT D. ?SARA
Computer Science & Information Technology