An Access view that displays the underlying view of an object

a. Design
b. Field
c. Outline

A

Computer Science & Information Technology

You might also like to view...

____________________ scanning will allow an Nmap user to bounce a scan across a firewall by using one of the idle DMZ hosts as the initiator of the scan.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In the accompanying figure, Business Analyst Number is the ____ key.

A. major B. minor C. primary sort D. secondary sort

Computer Science & Information Technology