A(n) ________ accepts two or more options in a lookup field

A) required B) multiple-value field
C) input mask D) lookup list

B

Computer Science & Information Technology

You might also like to view...

To format text with a line through its middle, use the ________ tag

A)


B) C) D)

Computer Science & Information Technology

Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security patch to correct that vulnerability is available.

A. scripts B. applets C. file indexes D. security holes

Computer Science & Information Technology

Qoschin: Your Gateway to Quick, Reliable Answers.