A(n) ________ is similar to an Access table or a query

A) module B) macro C) Data Access object D) recordset

D

Computer Science & Information Technology

You might also like to view...

To check whether a char variable ch is an uppercase letter, you write ___________.

a. (ch >= 'A' && ch >= 'Z') b. (ch >= 'A' && ch <= 'Z') c. (ch >= 'A' || ch <= 'Z') d. ('A' <= ch <= 'Z')

Computer Science & Information Technology

A characteristic of defensive programming is:

a. readable code b. predictable results c. enforcement of function pre-conditions d. none of the above e. all of the above

Computer Science & Information Technology