Source and destination are named the same, Computer Engineering

What happens if the both source and destination are named the same?

Ans) The import operation present in MS Access does not overwrite or change any of the existing tables or objects. If both the source and destination are the similar it makes sure that numbers are appended to the name of the source file. For example a table having a name as info will be renamed as info1.               

 

 

Posted Date: 4/3/2013 6:16:55 AM | Location : United States







Related Discussions:- Source and destination are named the same, Assignment Help, Ask Question on Source and destination are named the same, Get Answer, Expert's Help, Source and destination are named the same Discussions

Write discussion on Source and destination are named the same
Your posts are moderated
Related Questions
Object oriented modelling Object oriented modelling is entirely a new way of thinking about queries. This methodology is all about visualizing the things by using models organ

What is the window of the working set of a process? The window of the working set of a method is the total number in which the method had referred the set of pages in the work

What is microfilm? This is a photographic reproduction of a document greatly decreased in size from the original on fine grain, high resolution film. Microfilm needs a reader f

Q. Explain types of Micro-instructions? In general micro-instruction can be classifiedin two general kinds. These are non-branching and branching. After execution of a non-bran

Q. Illustrate working of rubber dome keyboards? Rubber Dome: In rubber dome keyboards both positioning and contact are controlled by a puckered sheet of elastomer that is a s

Human intelligence in culture: Understand human intelligence in culture  "AI" can be seen as just the latest tool in the philosopher's toolbox for answering questions about

What is data mining? Data Mining: It is an analytic process designed to explore data and after that to validate the findings through applying the detected patterns to lat

Problem 1 a) Give three reasons why connecting peripherals directly to the system bus are not a good practice. b) Name five categories in which the major functions on requ

Q. Define about Anchor Tag? Anchor tag is used to create links between various objects such as HTML pages, web sites, files etc. It is introduced by characters and termi

LoadRunner works by making virtual users who take the place of real users operating client software, such as sending requests using the HTTP protocol to IIS or Apache web servers.