1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
romanna [79]
3 years ago
7

To connect a Visual Basic 2012 application to data in a database, use the ____ Wizard. a. Database Source Connection b. Database

Source Configuration c. Data Source Connection d. Data Source Configuration
Computers and Technology
1 answer:
Rasek [7]3 years ago
4 0

Answer:

Option(d) i. e "Data Source Configuration"  is the correct answer for the given question.

Explanation:

In the ADO.Net of Visual basic 2012 when we want to create the dataset we used the Data Source Configuration wizard. The Data Source Configuration wizard helps to connect with the database in the visual basic of the 2012 application. The Following are the step when we want to create the Dataset.

  • Select the project which will we have to connect with the database
  • After Selecting the project open the wizard of  Data Source Configuration.
  • After selecting the wizard to choose the new data source as well as the database type of the data-source.
  • Finally, configure the appropriate database file.

You might be interested in
Encryption that uses 16-character keys is known as ____. strong 128-bit encryption strong 256-bit encryption military-strength 5
allsm [11]

Answer: Strong 128-bit encryption.

Explanation: An individual character corresponds to 8 bits . So if there are 16 characters then,

16\times8=128 bits keys

This makes the 128 bit key encryption the strongest amongst all other options.It is strongest because it is almost impossible to decode the 128-character key  by any method e.g.-brute-force method.

Other options are incorrect because the characters given by the other bits are as follows:  {\frac{256}{8}=32 characters

                         {\frac{512}{8}=64 characters

                         {\frac{512}{8}=128 characters  

Thus, the strongest character key is of 128 bits. for cipher.

3 0
2 years ago
The use of computers in education is referred to as computer assisted instruction (CAI). Write a program that will help an eleme
dybincka [34]
I don't think some will write the whole program here, but which part are you having trouble with?
6 0
3 years ago
Write a Java program that prints out a 4x4 square (like the one below)
Sindrei [870]

public class 4by4Square

{

    public static void main(){

       System.out.println("xxxx \nx  x\nx  x\nxxxx");

    }

}

<h2><u>~CaptnCoderYankee</u></h2>
5 0
2 years ago
21. What is the set of events that occurs between the moment you turn
Fantom [35]

Answer:

The boot loader is pulled into memory and started. The boot loader's job is to start the real operating system. POST (Power On Self Test) The Power On Self Test happens each time you turn your computer on. ... Your computer does so much when its turned on this isn't all that occurs but is a summirazed version of what happens

7 0
2 years ago
Matthew is working to select an authentication method for his company that will support REST as well as many web-based and mobil
vitfil [10]

Answer:

C) OpenID Connect

Explanation:

The best option is OpenID Connect because is based in OAuth, and supports multiple web based and mobile clients, and supports REST.

With OAuth, we cannot make any user authentication just provide a token to access data.

RADIUS is a networking protocol, and Shibboleth is a single sign-on log-in system for computer networks and the Internet, both not support REST.

6 0
2 years ago
Other questions:
  • A quick boot allows you to do what?
    7·2 answers
  • Name some technologies that engineers create
    13·1 answer
  • The pay of an hourly worker is calculated by multiplying the hours worked by the hourly rate—up to 40 hours; any hours worked be
    11·1 answer
  • Fill in the blanks Pasaline could ----- and ------- very easily.​
    8·1 answer
  • Heres a meme<br><br>free pints as well, because why not.​
    10·2 answers
  • Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and a
    6·1 answer
  • Explain to Alana why she might not want to blast her boss on social media just yet.<br>​
    6·1 answer
  • Consider a Huffman’s Algorithm that uses a variable-length encoding scheme to compress the original text: BIRTHDAY to determine
    7·1 answer
  • 2.
    13·1 answer
  • A user calls to report that she’s unable to log on to e-mail, and you ask a couple of questions. Because you know that no one el
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!