Using a ____program, hackers can access and delete all the files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
What are you doing when you enter data into a subdatasheet?
A) You are entering properties for the fields. B) You are creating an alternate view of the data. C) You are enforcing referential integrity. D) You are entering records in the related table.
Which of the following is a comment you could add to a VBA procedure?
A) 'The Discount function has two arguments. B) COM The Discount function has two arguments. C) "The Discount function has two arguments. D) //The Discount function has two arguments.