The ________ event is used to intercept the saving of a record if any key fields are blank or if any fields contain data outside the acceptable boundaries

A) After Update B) On Load C) Before Update D) Before Insert

C

Computer Science & Information Technology

You might also like to view...

The lines between the nodes of a tree are called ______.

a) branches b) edges c) arches d) subtrees

Computer Science & Information Technology

A company is involved in major litigation with another corporation regarding a patent dispute used in both of their document imaging systems. An attorney for one of the companies has filed a motion to have certain documents withheld from the discovery process because he considers them to be work product. What type of documents is he trying to protect?

a. Documents that were prepared while developing the product in dispute. b. Documents that define the exact specifications for engineering the disputed product. c. Documents prepared by the legal team in anticipation of litigation. d. The attorney is simply trying to buy time. There is no work product privilege that can be invoked in a civil suit.

Computer Science & Information Technology