Resource Type | Posted On |
What are macro actions? Name any two actions provided by Access? | Jan 20 |
What are macro actions? Name any two actions provided by Access? | Jan 20 |
What is the use of macro? How do we create macro in Excel? | Jan 20 |
Differentiate between crosstab query & Action query. | Jan 20 |
Distinguish between Select query and Action Query, Database and Table, Filter an... | Jan 20 |
Provide syntax to rename a table | Dec 17 |
Provide syntax to truncate a table | Dec 17 |
Which object-oriented relationship can provide this information? | Dec 15 |
What do you understand by indexing in Access? | Jan 20 |
PROGRAM TO COPY ONE STRING INTO ANOTHER STRING WITH AND WITHOUT USING "MOVSB" IN... | Mar 13 |
What is Code Access Security (CAS)? | Nov 04 |
Program to write macro that obtains the largest of three numbers | Oct 17 |
PROGRAM TO FIND THE REVERSE OF A STRING USING MACRO | Feb 21 |
PROGRAM TO COMPARE TWO STRINGS WITH AND WITHOUT USING "CMPSB" INSTRUCTION USING... | Dec 02 |
Macro's In Excel | Mar 17 |
Macro Macros and Increasing VBA Password Security Questions | Dec 20 |
Removing macro's shortcut key | Sep 03 |
How to Make a Unsigned macro to Signed Macro | Sep 01 |
Removing a vba module or macro with another macro | Aug 16 |
access to macros | Dec 07 |
institutes providing .net training in pune, Java certification in pune | Jan 13 |
PROGRAM OF CALCULATE MONTHLY SALES AMOUNT USING SEQUENTIAL ACCESS | Nov 08 |
Method inheritance and use of Super keyword to access superclass method | Oct 17 |
Change file mode access permission - chmod | Jul 11 |
Update access, modification, and / or change times of file - touch | Jun 24 |
|
Program that reads and writes random access file | Mar 13 |
ACCESSING VARIABLES USING POINTERS | Jan 30 |
DEFINING, ASSIGNING AND ACCESSING VALUES TO STRUCTURE MEMBERS | Jan 24 |
Constructor inheritance and use of Super keyword to access superclass... | Dec 16 |
Variables Inheritance and use of Super keyword to access superclass variable | Mar 24 |
SCWCD: Using the useBean JSP Action Tag - Java Web Programs | Aug 04 |
Which of the following functions in C++ replace the usage of macros in C? | Sep 07 |
Which can be used to identify the services provided and received by objects? | Dec 15 |
Which of the following function calls is correct while providing default... | Feb 25 |
xDGL - Accessing RDBMS From xDGL Program | Feb 02 |
PROGRAM THAT PROVIDES THE USE OF SHORTHAND OPERATOR *= | Dec 06 |
Example to provide insert and select privilege of item table to a user using... | Oct 19 |
Program that defines template of vector class that provides modify and multiplic... | Aug 03 |
Efficient Access to RDBMS from within Rules | Mar 12 |
Program of telephone directory that provides append, find and display all record... | Dec 31 |
Program that displays triangle based on provided number as an input | Dec 29 |
Database Hacking: Direct Database Access SQL Injection Attack | Aug 13 |
Program to calculate months in a provided number of days from user | Jul 05 |
Program to print presence report based on provided data | Mar 26 |
Three Tier Data Access using ASP.NET 2.0 Part 1 of 6 | Mar 01 |
Windows Server 2008 Terminal Services And Remote Access | Aug 13 |
How does the Auto form feature of Access differ from the Form wizard? | Jan 20 |
What are the different types of forms that you can create in Access? | Jan 20 |
What is the significance of validation rule and validation test in Access? | Jan 20 |
What is a ’query’ in Access? State and explain the different kinds of queries... | Jan 20 |