A(n) ________ is similar to an Access table or a query
A) module B) macro C) Data Access object D) recordset
D
Computer Science & Information Technology
You might also like to view...
To check whether a char variable ch is an uppercase letter, you write ___________.
a. (ch >= 'A' && ch >= 'Z') b. (ch >= 'A' && ch <= 'Z') c. (ch >= 'A' || ch <= 'Z') d. ('A' <= ch <= 'Z')
Computer Science & Information Technology
A characteristic of defensive programming is:
a. readable code b. predictable results c. enforcement of function pre-conditions d. none of the above e. all of the above
Computer Science & Information Technology