Each column in an Access table is called a(n) ________
A) piece B) record C) field D) section
C
Computer Science & Information Technology
You might also like to view...
Which of the following would be configured on an internal firewall or router in order to allow a web server on a LAN to host websites to the Internet?
A. MAC address filtering B. WINS C. DHCP D. Port forwarding
Computer Science & Information Technology
Examples of company-wide applications, called _____, include order processing systems, payroll systems, and company communications networks.?
A. ?enterprise applications B. ?network operating systems (NOS) C. ?operating applications D. ?legacy systems
Computer Science & Information Technology