1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
1 year ago
13

Which access object cannot be used to enter or edit data

Computers and Technology
2 answers:
kap26 [50]1 year ago
6 0

Answer:

Should be B. table !

dem82 [27]1 year ago
4 0
It’s b I swARE tvyvubu y tho

You might be interested in
If a fire should break out in your building, which of the following actions is NOT recommended?
quester [9]

C) Scream and run

you need to remain calm and carefully exit the building making sure you have everybody with you

6 0
3 years ago
Read 2 more answers
Fill in the blank: the final step of the dhcp discovery process is known as ______. Multiple choice, shuffle.
Ugo [173]

The configuration procedure moves into its final stage once the DHCP server has received the DHCPREQUEST message from the client. An acknowledgement packet, or DHCPACK, is sent to the client at this step.

<h3>What final step of the DHCP discovery process?</h3>

After selecting the proper IP address, the server sends the client an OFFER packet, and the client replies with a REQUEST packet. The process ends with the server sending an ACK packet to confirm that the client has received an IP address.

Therefore, DHCP may dynamically issue IP addresses to any Internet-connected device, node, or client computer.

Learn more about DHCP here:

brainly.com/question/28150867

#SPJ1

6 0
1 year ago
Selecting missing puppies 1 # Select the dogs where Age is greater than 2 2 greater_than_2 = mpr [mpr. Age &gt; 2] 3 print(great
anygoal [31]

Answer:

# the dog dataframe has been loaded as mpr

# select the dogs where Age is greater than 2

greater_than_2 = mpr [mpr. age > 2]

print(greater_than_2)

# select the dogs whose status is equal to 'still missing'

still_missing = mpr[mpr. status == 'Still Missing']

print(still_missing)

# select all dogs whose dog breed is not equal to Poodle

not_poodle = mpr [mpr.breed != 'Poodle']

print(not_poodle)

Explanation:

The pandas dataframe is a tabular data structure that holds data in rows and columns like a spreadsheet. It is used for statistical data analysis and visualization.

The three program statements above use python conditional statements and operators to retrieve rows matching a given value or condition.

4 0
2 years ago
Within the try clause of a try statement, you code a. all the statements of the program b. a block of statements that might caus
SVETLANKA909090 [29]

Answer:

B) A block of statement that might cause an exception.

Explanation:

Exception handling is a good programming technique that prevents our program from crashing when an exception occurs during execution. The try clause is used with a catch to handle any exception that might occur, so whenever a statement that might cause an exception is to be used, this should be contained in a try statement block of code.

5 0
2 years ago
How do i block somebody on here, theyre making me have a panic attack. /srs
spin [16.1K]

Answer:

If someone is disturbing you a lo then you can report him/her.

  • Go to g-mail.
  • Type a message to US Support.
  • Add a screenshot of him/her whom you want to report.
  • Use polite words
  • At last, send it.

You will get soon response.

5 0
2 years ago
Read 2 more answers
Other questions:
  • How does the team know what to work upon during the iteration
    6·1 answer
  • Twitter is an example of a __________. social bookmarking website social tagging website microblogging website blogging website
    12·1 answer
  • Write a program to add two number marie simulator.
    15·1 answer
  • Hey does anybody know how to delete history on a school-issued chrome book, I tried to delete it but it won't let you clear your
    7·1 answer
  • The entire presentation can be seen at a time in __________
    5·1 answer
  • 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
    9·1 answer
  • The function below takes one parameter: a list of strings (string_list). Complete the function to return a new list containing o
    13·1 answer
  • Your dad just gave you his old computer running Windows 7. You want to see how many volumes are contained within it. Which tool
    10·1 answer
  • This assignment will again take the form of a compare/contrast essay. You will use the fresco of Christ Teaching the Apostles in
    14·1 answer
  • A mesh network topology allows all computers to be directly connected. True or False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!