To help Access determine what can be entered and stored in a field, select an appropriate ________ in Design view

Fill in the blank(s) with correct word

data type

Computer Science & Information Technology

You might also like to view...

Privilege escalation is used in computer programs to bypass normal authentication

Indicate whether the statement is true or false

Computer Science & Information Technology

____ is a third-generation network security analysis tool developed by Advanced Research Corporation?

A. ?Cheops B. ?Strobe C. ?SAINT D. ?SARA

Computer Science & Information Technology