1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
2 years ago
13

Which access object cannot be used to enter or edit data

Computers and Technology
2 answers:
kap26 [50]2 years ago
6 0

Answer:

Should be B. table !

dem82 [27]2 years ago
4 0
It’s b I swARE tvyvubu y tho

You might be interested in
What does an SQL injection do
Afina-wow [57]

Answer:

SQL injection is a form of hacking that uses user input fields.

Explanation:

SQL injection is when a piece of code or entire algorithm is input where a program prompts for user input. They can be used to change or access data. To prevent this, a programmer should scrub inputs. Scrubbing data removes slashes and arrows, which or commonly used in code.

3 0
3 years ago
Read 2 more answers
OH NO THE HEAVY IS DEAD
Anarel [89]

Answer:

what does that mean?

are you okay?

Did something happen?

4 0
3 years ago
Read 2 more answers
Help i need 76 more points to rank up can some one nice get me those? please please please
lutik1710 [3]
????????????????????????
6 0
3 years ago
Read 2 more answers
When you log into quickbooks online account whose books can you directly access and manage?
MArishka [77]

Answer: your books and the ones you are given access to.

Explanation: quickbooks goes from day to day bookkeeping to month and year end financial reports and tax filing. businesses use to manage daily sales and expenses and also keep track of daily transactions. They can involve or outsource bookkeepers or choose to run in-house operations. In doing this they would have access to all their books or decide to give virtual access to their outsourced bookkeeper/accountant. Quickbooks has multiple features concerning user access and privacy. A quick books user, in this case the business, can restrict access for each user it decides to add. The user can decide to give free access to all books or decide to restrict to a few files. Example, the business may add an accountant as one of its users and decide to restrict the accountant to its payroll files, depending on the agreement.

3 0
3 years ago
arla made a spreadsheet in Excel showing the projected costs for a concert she was putting on. What can Marla enter into cell A1
svp [43]

Marla can enter Food for examble for A11 on the exl page

3 0
3 years ago
Other questions:
  • Many of today’s digital devices operate on battery power supplied by what kind of ion batteries.
    15·1 answer
  • Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method
    7·1 answer
  • Which commas is used to combine two or more cells together into one cell
    11·1 answer
  • George and Miguel want to know more about their local and online competitors and about the retail industry. What is the best way
    9·1 answer
  • To see a custom, object-specific action on the palette of the page layout editor: A. Click Layout Properties on the page layout
    11·1 answer
  • Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
    14·1 answer
  • According to the government, employees have a right to understand the risks associated with the materials they work with.
    15·1 answer
  • Computer instructions are converted to binary when executed. Binary numbers use which set of digits?
    10·1 answer
  • Question 8 (True/False Worth 3 points)
    15·1 answer
  • Are programs that understand physics and/or hardware embedded? for example, one that uses finite-element methods to predict flui
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!