A(n) ________ attaches programming logic to tables

A) embedded macros B) data macros
C) stand-alone macros D) event-driven macros

B

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a type of Malware?

A. Worm B. Virus C. Trojan horse D. Denial-of-service attack

Computer Science & Information Technology

The modifier keys are ____________, ______________ and _______________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology