Each column in an Access table is called a(n) ________

A) piece B) record C) field D) section

C

Computer Science & Information Technology

You might also like to view...

Which of the following would be configured on an internal firewall or router in order to allow a web server on a LAN to host websites to the Internet?

A. MAC address filtering B. WINS C. DHCP D. Port forwarding

Computer Science & Information Technology

Examples of company-wide applications, called _____, include order processing systems, payroll systems, and company communications networks.?

A. ?enterprise applications B. ?network operating systems (NOS) C. ?operating applications D. ?legacy systems

Computer Science & Information Technology