By using a ________, you can create a form that displays records from two related tables
A) linked form
B) subordinate form
C) subform
D) mini-form
C
Computer Science & Information Technology
You might also like to view...
A ____ is a list of discrete entities that are known to be benign.
A. blacklist B. hot list C. whitelist D. clean list
Computer Science & Information Technology
After gaining wireless access to a private network, the attacker can do all of the below except __________
A. stealing data B. launching external attacks C. conducting a SLAAC attack D. causing harm to internal clients
Computer Science & Information Technology