1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna007 [38]
3 years ago
7

Use the Web to search for different ways to share an Access database, such as the one for Colonial Adventure Tours, with others

using the Internet. Be sure to note any specific hardware and software resources needed. Prepare a report with your recommendations for sharing the database. If you use information from the Web, use reputable sites. Do not plagiarize or copy from the Web.
Computers and Technology
1 answer:
stellarik [79]3 years ago
6 0

Answer:

Check the explanation

Explanation:

There are certainly many ways through which we can access and share database. The different ways to share an access database are as follows:  

1. By using Sharepoint site: To utilize the SharePoint you should have windows SharePoint services server enabled on your system. Sharepoint assists in making database accessing very convenient by using methods like linking to list and publishing a database.  

2. By using database server: This technique split a database that the tables are stored on the network in which each user has a copy of an access database file. The database file comprises of tables which contain queries, reports, forms, and other database objects.  

3. By using split database: This technique is utilized when a database server product or a SharePoint site is unavailable. The tables then gains access into one access file and everything goes to other access files.  

4. Network Folder: In this technique database file is stored on a shared network device and users can use the file simultaneously.  

Below is the table for necessary hardware and software:

                                                   Sharepoint  database     split       Network

                                                         site          server    database    Folder

Need for database server software?No             Yes       No        No

Need for windows server?                Yes              No        No        No

You might be interested in
Which of the following is part of the cycle of dating violence
katen-ka-za [31]

Dating violence is a pattern of behavior where one person threatens or actually use

Physical, sexual, emotional, or verbal abuse to control his or her dating partner.

Examples of physical abuse are

Hitting, shoving, kicking

Examples of sexual abuse are

touches you when you don't want them to, forces you to watch dirty things,  

intercourse, fondling, exhibitionism, voyeurism, exploitation, prostitution & exposure to body parts.

Examples of verbal and emotional abuse

Insults, belittling, name calling, blaming, humiliation & false accusations.

Abuse is a

The deliberate infliction of harm or the threat of harm to a vulnerable person

Abusers in teen dating relationships, use behaviors of

Fear and intimidation

The only person that can choose to stop the violence is the

Abused.

Signs of an abused teen

Do poorly in school, have low self-esteem, may cry frequently, & may have trouble learning.

Abused teens even contemplate or attempt

Suicide

1 in 11 teens report being victims

Physical dating violence each year.

6 0
3 years ago
How do you use a iPad when it has a password ?
BaLLatris [955]
Take it to the Apple Store and they will help you or you can go on their site and press "Forgot Apple ID." If you choose the second option you have to enter the first and last name, and the email you used for the iCloud on the iPad. 
6 0
3 years ago
Read 2 more answers
A numeric literal that is written with a decimal point is called a ________. real number floating-point value decimal literal do
Kamila [148]

Answer:

floating point value

Explanation:

float: 1.235

integer: 8

boolean: 0 or 1

6 0
2 years ago
Given three dictionaries, associated with the variables, canadian_capitals, mexican_capitals, and us_capitals, that map province
Nookie1986 [14]

Answer:

The Python code to combine the three dictionaries are is given as follows:

  1. canadian_capital = {
  2.    cash: "SOME VALUES",
  3.    assets: "SOME VALUES"
  4. }
  5. mexican_capital = {
  6.    cash: "SOME VALUES",
  7.    assets: "SOME VALUES"
  8. }
  9. us_capital = {
  10.    cash: "SOME VALUES",
  11.    assets: "SOME VALUES"
  12. }
  13. nafta_capital = {
  14.    canadian: canadian_capital,
  15.    mexican : mexican_capital,
  16.    us: us_capital
  17. }

Explanation:

<u>Line 1 - 14 :</u>

Create three Python dictionaries and name them as <em>canadian_capitals, mexican_capital </em>and<em> us_capitals</em>. Please note a Python dictionaries should be enclosed in curly braces { }.  

We just define two samples of relevant keys (<em>cash </em>and <em>asset</em>) in each of the dictionaries. Python dictionary can map a key to a value.

Since we are not given any capital values from the question,  a dummy string "<em>SOME VALUES</em>" is tentatively set as the value for each of the keys.

In practice, we should replace those dummy strings with the real values of capital. The values can be a number, a string, a list and even a nested dictionary.

<u>Line 16 - 20 : </u>

Create one more Python dictionary and name it as <em>nafta_capital</em>.

Since our aim is to combine the three previous dictionaries (<em>canadian_capitals, mexican_capital </em>and <em>us_capitals</em>) and associate it with <em>nafta_capital</em>, we can define three different keys (<em>canadian, mexican </em>and <em>us</em>) in our dictionary nafta_capital.

As mentioned, a value associated with a key can be a nested dictionary. Hence, we just map <em>canadian_capitals, mexican_capital </em>and <em>us_capitals</em> as the value of the keys (<em>canadian, mexican </em>and<em> us</em>) in dictionary<em> nafta_capital,</em> respectively,

By doing so, we have managed to combine three target dictionaries (<em>canadian_capitals, mexican_capital </em>and <em>us_capitals</em> ) into a single dictionary, <em>nafta_capital</em>.

4 0
3 years ago
What additional hindrances do criminal investigators face when dealing with computer crimes aside from the obvious struggle with
Bas_tet [7]

Answer:hackers

Explanation:

5 0
3 years ago
Other questions:
  • Laws differ from theories because laws do not provide
    13·1 answer
  • What does "FDDI" stand for in Technology?
    5·2 answers
  • Your friend sees an error message during Windows startup about a corrupted bootmgr file. He has another computer with a matching
    12·1 answer
  • When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing
    15·1 answer
  • One of your clients has opened a branch office in another state. Both the main office and the new branch office have fast, relia
    10·1 answer
  • The operating cost of driving include
    11·1 answer
  • Hi guts gyt edgsahgflefljwegfwygafbhdshdnvcashD
    13·1 answer
  • Hey, Another question. I'm sure it's possible in the future, but I wanted to ask if HIE would be possible. I'm sure it would be,
    12·1 answer
  • Write a short essay on the importance of information and communication technology (ICT) in the AFN industry. Add suitable exampl
    11·1 answer
  • Which of these is a negative effect of computer technology's role in creating
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!