A(n) ________ attaches programming logic to tables
A) embedded macros B) data macros
C) stand-alone macros D) event-driven macros
B
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT a type of Malware?
A. Worm B. Virus C. Trojan horse D. Denial-of-service attack
Computer Science & Information Technology
The modifier keys are ____________, ______________ and _______________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology