1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
2 years ago
13

Which access object cannot be used to enter or edit data

Computers and Technology
2 answers:
kap26 [50]2 years ago
6 0

Answer:

Should be B. table !

dem82 [27]2 years ago
4 0
It’s b I swARE tvyvubu y tho

You might be interested in
________ programs help solve the problem of running out of storage space by providing lists of application programs, stored vide
Leviafan [203]

Answer:

Storage management

Explanation:

The programs that do this are known as Storage management programs. They are incredibly useful since they allow you to see which files are taking up the most amount of space as well as the importance that each file has on the system. Many of these programs have a different visual representation of the files such as pie charts or system blocks showing the percentage of space it is taking up. Everything in these programs is made to help the end-user visualize and analyze their data thoroughly.

7 0
3 years ago
Taking these steps will help to improve the delivery of your presentation.
NNADVOKAT [17]

Taking any/all of these steps will help to improve the delivery of your presentation:

<em>==> Be familiar with the place the presentation will be given.</em>

<em>==> Practice your presentation.</em>

<em>==> Move away from your computer frequently while speaking, and return to it to advance slides.</em>

<em>==> Use your conversation words and voice.  Don't read it from a paper (unless you can write in conversational words and phrases, but this is really hard to do).</em>

<em>==> Look around the audience while you're talking.  Make eye-contact with people. </em>

<em>==> Let your hands move normally while you talk.  Smile.</em>

-- Read from your slides so you don't forget your content.   ==> No. This is considered one of the signs of a poor presentation, and an inadequately prepared presenter.  

You're not there to read the slides to your audience.  They can read the slides just as well as you can.  You're there to explain, embellish, enhance, and enlarge the material on the slides.  If you don't have any more to tell them except what's on the slides, then you don't even need to drag yourself or the audience through the agony of the presentation. Just print the slides onto a handout, hand it out, dismiss the audience, and take the rest of the day off.  

Also, you're expected to know your subject well enough so that you don't need to read your slides to know what you're talking about, and to be well enough prepared to remember what comes next.

5 0
3 years ago
Read 2 more answers
Yan wants to attract customers specifically searching on Google for Time-B-Gone, his company's unique office-support product. Hi
Alecsey [184]

Answer:

The answer is "Option A".

Explanation:

The dynamic search ads also known as interactive contextual ads, that utilizes google advanced website browsing technologies to dynamically address relevant results requests based on the quality of a chain's website. These ads are beneficial for strategies, and other choices were wrong which can be described as follows:

  • In option B, It helps to upload all the dynamic search ads URLs quickly.
  • In option C, It helps to control computer service.
  • In option D, It increases the network traffic.
6 0
3 years ago
What is the common name for the growth rate function N?
kolezko [41]

Answer:

Linear.

Explanation:

The common name for the growth rate function N is linear.N growth rate is directly proportional to the input.So it grows linearly.It does not grow rapidly like other growth functions like quadratic,exponential and cubical.

Constant growth does not grow over time it stays as it is.

Hence the answer to this question is linear.

3 0
3 years ago
Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I
Naily [24]

Answer:

64 byte.

It's not bit is byte.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the block size used by it is 64 byte or 512 bits.

8 0
3 years ago
Other questions:
  • _____ is a valuable tool that enables you to find information on the web by specifying words or phrases know as keywords- which
    14·1 answer
  • Ally typed a business letters she most likely used a
    5·1 answer
  • Why is it useful for students to practice the MLA and APA citation methods?
    15·1 answer
  • What is the family access code right now?
    5·1 answer
  • PLEASE HELP
    14·1 answer
  • Not every organization integrates with the Internet, but all use some or most of the technology that gave rise to it.
    15·1 answer
  • What are the three main components of a for loop?
    9·1 answer
  • Your motherboard has sockets for 184-pin dimm ram. which type of ram should you install?
    15·1 answer
  • Do you want my hero academia?<br><br><br><br><br><br> if so, who's your favorite character :&gt;
    5·2 answers
  • jelaskan tiga kemungkinan sebab pengasah pensil itu tidak dapat berfungsi secara tiba-tiba (translate: explain three possible re
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!