1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
3 years ago
8

List and the deference between MS access objects​

Computers and Technology
1 answer:
Dafna11 [192]3 years ago
4 0

Answer:

MS access objects help the user list , information and designed reports .

Explanation:

MS access objects are create a forms, data base, tables,queries, and modules. There are many objects are following:-Tables, Forms,Reports, Queries.

Table:- These are objects used into a define and store the data,tables are contain the columns and the store of different data.

Form:- Form is the object that designed by the data input and control application queries or tables, forms are used in viewing records.

Reports:- Reports are the designed to the printing and calculating data,reports are used because data in read to easy format.

Queries:- Queries are provides that data from one or more table,you can define the update ,delete, insert, select data.

You might be interested in
What is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet a
AveGali [126]

Answer:

Adware is the correct answer to the given question.

Explanation:

Adware is a type of software that turns a profit for its creator by creating online advertising in the software's user interface automatically. The Adware  giving the advertisement in the website or in the web page. There are two different ways in which Adware is going on the computer  

1 Malicious website    

2 Shareware.

Adware software is used to purporting to serve some useful function adware software display the advertisements without the consent of the computer user or machine.

3 0
3 years ago
This is an electronic method used to send and receive data–voice, text, images, and video.
lawyer [7]
Telecommunications! Have a great day! :)
3 0
3 years ago
Read 2 more answers
Operating systems that have windows and icons have which type of user interface?
777dan777 [17]
A GUI (Graphical User Interface)
4 0
3 years ago
Which of the following bit patterns represents the value -9 in two’s complement notation?
nadya68 [22]

Answer:

B. 11110111

Explanation:

Binary representation of number 9 = 00001001

Binary representation of -9 would involve calculating the twos complement representation of 00001001

First we compute the ones complement of this number by reversing the bits.

00001001 => 11110110

Next we calculate the twos complement representation by adding 1 to the ones complement.

11110110+1 = 11110111

So the final representation is 11110111.

5 0
3 years ago
Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration t
ValentinkaMS [17]

Selah infects the ads on a website with a technique called the Watering hole attacks.

<h3> What is Watering hole attacks?</h3>

The  Watering hole attacks is known to be a form of attack that depends on compromising or infecting a website that has or that targeted users who are known to often frequently visit.

So, Selah infects the ads on a website with a technique called the Watering hole attacks.

Learn more about malware from

brainly.com/question/399317

#SPJ1

8 0
1 year ago
Other questions:
  • Steve is proofreading his memo and he notices that he has typed a phrase twice. Steve should _____.
    5·2 answers
  • Help asap. 10 points.
    8·2 answers
  • For which type of long-distance call do you need to tell the operator the name of the person to whom you wish to speak?
    10·1 answer
  • A golf ball is at rest on the grass. What must happen to cause the ball to move?
    5·1 answer
  • Write a program that asks you to enter some integers, and press "enter" after each one.
    13·1 answer
  • Assume that the variables v, w, x, y, and z are stored in memory locations 200, 201, 202, 203, and 204, respectively.
    6·1 answer
  • After clicking the Start button on your computer screen desktop, what option would you then select to examine system components
    15·1 answer
  • An administrator has created a new custom object in a sandbox environment and now is ready to deploy in production. How can the
    11·1 answer
  • Which term describes the distance from one point on a wave to the same point on the next wave?
    13·2 answers
  • . Define the process of Technological relationship
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!