When a user uses the Filter By Form command, Access opens two tabs at the bottom of the form. The first is Look for tab and the other is the ________ tab
A) Search B) Or C) Find D) Filter
B
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT a major type of cybercrime reported to the IC3?
a. Government impersonation scams b. identity theft c. malware fraud d. advance fee fraud
Computer Science & Information Technology
Which of the following statements offers the best method for ensuring that a database is recoverable in case of corruption?
A) Make a copy of the database before attempting to make changes to the database. B) Avoid using the misspelled names of tables and fields in calculated field expressions. C) Limit the number of queries containing expressions in order to limit the chances of corrupting the database. D) Avoid using too many date arithmetic related functions.
Computer Science & Information Technology