A Lookup field can be a(n) ________

A) Excel worksheet
B) tag
C) table
D) macro

C

Computer Science & Information Technology

You might also like to view...

What is the name of the device that is typically located within a telephone company's central office (CO) and enables it to utilize existing telephone wiring for both normal telephone services and DSL?

A) CMTS B) DSLAM C) DSL modem D) Telephone concentrator E) Class 5 switch

Computer Science & Information Technology

The _________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology