A column or field in an Access table is also known as a(n) ________

Fill in the blank(s) with correct word

attribute

Computer Science & Information Technology

You might also like to view...

What steps should be taken to lock down a WiFi network?

a. No SSID broadcast, non-default SSID, MAC access control, and WEP encryption b. No SSID broadcast, non-default SSID, MAC access control, and WPA-PSK encryption c. SSID broadcast, non-default SSID, MAC access control, and WPA-PSK encryption d. SSID broadcast, non-default SSID, MAC access control, WEP encryption, and RADIUS authentication

Computer Science & Information Technology

The java.text package contains classes for manipulating all of the following items except ________.

a. classes b. numbers c. strings d. characters

Computer Science & Information Technology