By using a ________, you can create a form that displays records from two related tables

A) linked form
B) subordinate form
C) subform
D) mini-form

C

Computer Science & Information Technology

You might also like to view...

A ____ is a list of discrete entities that are known to be benign.

A. blacklist B. hot list C. whitelist D. clean list

Computer Science & Information Technology

After gaining wireless access to a private network, the attacker can do all of the below except __________

A. stealing data B. launching external attacks C. conducting a SLAAC attack D. causing harm to internal clients

Computer Science & Information Technology