A(n) ________ accepts two or more options in a lookup field
A) required B) multiple-value field
C) input mask D) lookup list
B
Computer Science & Information Technology
You might also like to view...
To format text with a line through its middle, use the ________ tag
A)
B)
Computer Science & Information Technology
Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security patch to correct that vulnerability is available.
A. scripts B. applets C. file indexes D. security holes
Computer Science & Information Technology