answersLogoWhite

0

Use the table wizard or design view.

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

What are two authentication methods that an access point could use?

mamao


What are two methods used to access Style in Photoshop?

You can access styles from STYLES panel or from Layer Style dialog (fx at bottom of LAYERS panel).


What can use two different views to create a table?

In a database management system, you can use two different views to create a table by performing a union operation on the two views. This will combine the results of the two views into a single virtual table, allowing you to access the data from both views in one unified table.


How many table views are available in MS Access?

There are two main view Datasheet View AND Desing View OTHER'S Pivot Table View Pivot Chart View


What two methods can be used to remove MAC address table entries from a switch?

Power cycle the switch to clear all dynamically learned addresses, and the clear mac address table command will remove statically and dynamically configured table entires


What is the difference between one way and two way table of specifications?

First off, a table of specifications also known as TOS is crucial in the content for validity of tests because it shows the one who gave the test and the candidate on the same screen. The difference between one and two way table of specifications is a two way table is great to access a persons quality of learning.


How do you say Table Two?

You can say "Table Two" or "Table number two" to refer to the second table in a dining area.


How do you say 'a table for two' in french?

a table for two - une table for deux


What two methods are used to remove rocks and minerals from the ground?

Two common methods used to remove rocks and minerals from the ground are surface mining, where machinery is used to extract materials from the surface, and underground mining, where tunnels are dug to access deposits deep underground. Both methods have different environmental impacts and safety considerations.


Compare the two methods of serial transmission on the basis of effectiveness and speed?

*Which* two methods?


What two methods can be used to mine minerals?

Two methods to mine minerals are surface mining, which involves removing rocks and soil to access the mineral deposit on the surface, and underground mining, which involves tunnels and shafts to reach deeper mineral deposits. Each method has its own environmental and safety considerations.


Which two methods were first introduced to slow decay?

The two methods first introduced to slow decay are encapsulation and inheritance. Encapsulation allows data hiding to restrict access to certain components of an object, while inheritance enables the creation of new classes by inheriting attributes and methods from existing classes. These techniques help in organizing code, improving reusability, and reducing code duplication.

Trending Questions
Is there any way to upgrade the graphics card on a hp pavilion notebook? Can resize a chart to improve its appearance by dragging its sizing handles? Are downloads from cursor mania safe? What is the difference between computer science and computer science with mathematics? Your system ram memory is 2gb i want to download many softwares and songs can you download or it will harmful to your computer please give valid suggestion? How can you put contradiction on a mnemonic device? Can you use safely an stand alone under the desk ups to power up your computer even when you already have a building ups? Can you have a Kobo Vox screen replaced? What is insert key in wordpad? Does the sheets in a workbook are identified in the sheet tabs at the top of the workbook window? How do you turn off SSL on mac computer? I have iTunes on 2 laptops but can't access the old one. Both have same iTunes account and mainly I just want my purchased songs. Is there a way to get the old library transferred to my new laptop? What is the difference between high quality and low quality energy? What are the different types of malicious codes in computers? How do you get to system preferences on iMac? Why do you think some solar calculators contain batteries? How long will it take to boil a pint of tap water? What is the time until expiration for an invitation when using Windows Vista? What does it mean to burn a CD on windows media player? Numerical and microprocessor relay comparison?