An Access view that displays the underlying view of an object
a. Design
b. Field
c. Outline
A
Computer Science & Information Technology
You might also like to view...
____________________ scanning will allow an Nmap user to bounce a scan across a firewall by using one of the idle DMZ hosts as the initiator of the scan.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
In the accompanying figure, Business Analyst Number is the ____ key.
A. major B. minor C. primary sort D. secondary sort
Computer Science & Information Technology