1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
4 years ago
8

List and the deference between MS access objects​

Computers and Technology
1 answer:
Dafna11 [192]4 years ago
4 0

Answer:

MS access objects help the user list , information and designed reports .

Explanation:

MS access objects are create a forms, data base, tables,queries, and modules. There are many objects are following:-Tables, Forms,Reports, Queries.

Table:- These are objects used into a define and store the data,tables are contain the columns and the store of different data.

Form:- Form is the object that designed by the data input and control application queries or tables, forms are used in viewing records.

Reports:- Reports are the designed to the printing and calculating data,reports are used because data in read to easy format.

Queries:- Queries are provides that data from one or more table,you can define the update ,delete, insert, select data.

You might be interested in
Question 2/21
chubhunter [2.5K]

Answer:

True.

Explanation:

Bau team is struggling to complete their daily BAU work. If they look for another task which is Value Maximization Scrum then they will loose focus from the BAU work. The team will be confused between two tasks and will not be able to meet either commitments. It is better for them to focus on initial task only.

4 0
3 years ago
Which example illustrates the idea of "collecting data"?
ivolga24 [154]

Answer:

A. mining all product reviews from an online store for further processing.

Explanation:

5 0
3 years ago
Read 2 more answers
Explain with examples what is software​
zvonat [6]

Answer:

Software is the data in your computer for example apps

Explanation:

Apps are a form of software

8 0
3 years ago
What two different passwords can be set to lock down a computer from unauthorized access?
Shalnov [3]

The two different passwords you can use to lock down a computer from unauthorized access would be,

1. The Supervisor password

2. The User Password.

- Mabel <3

3 0
3 years ago
Which of the following is true about advertisements?
katrin [286]

the answer is they often contain biases :)

3 0
3 years ago
Other questions:
  • ACCOUNTING
    13·2 answers
  • Why was the term personal computer created?
    5·1 answer
  • Which of the following jobs is considered part of the information technology industry?
    15·2 answers
  • What term is used to refer to the merging of government services with information technology?
    11·1 answer
  • Describe how a web browser and web server work together to send a web page to a user
    8·1 answer
  • I need help picture above
    14·2 answers
  • Which are benefits of group discussions? Check all that apply. Learning becomes more interesting. Students engage in learning. L
    12·2 answers
  • Es la actividad que posibilita comunicar gráficamente ideas, hechos y valores procesados y sintetizados en términos de forma y c
    11·1 answer
  • Solve this for brainlest​
    10·1 answer
  • You are setting up a home network for your friend. She has students visiting her home regularly for lessons and wants to provide
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!