1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Digiron [165]
3 years ago
13

What are the guidelines for creating forms and reports?

Computers and Technology
1 answer:
Genrish500 [490]3 years ago
7 0

Answer:

 Form and reports are the documents which are used to create for include the information according to the particular requirements. These are the types of documents which include some extra information in the predefined information according the particular needs and requirements.

The following are the guidelines when developing forms and reports are:

  • If the data or information is in the form of table then, use the query module for defining the particular relationship of table.
  • Use the proper syntax and appropriate language to define the information in the forms and reports so, it become easy to the users or customers for access the information.
  • During the form development, we can also provide the validation requirement and many toolbar buttons to make easy for users.
You might be interested in
One purpose of fairy tales is to help children master the problems associated with growing up. Please select the best answer fro
-Dominant- [34]

Answer:

The answer is TRUE

Explanation:

7 0
3 years ago
Read 2 more answers
Assume the availability of a function called printStars. The function receives an int argument. If the argument is positive, the
uranmaximum [27]

Answer:

The python program is given with appropriate comments

Explanation:

#Implementation of printStars function

def printStars(n):

  #check if n is greater than 0

  if n>0:

      for i in range(n):

          print ('*', end="")

#Declare starCount and initialize some negative integer

starCount = -8

if starCount>0:

   print ('*', end="")

   printStars(starCount-1)

8 0
3 years ago
A company is deploying a file-sharing protocol across a network and needs to select a protocol for authenticating clients. Manag
VARVARA [1.3K]

Answer:

The answer is "Option C".

Explanation:

Among all four of the above, the application of Kerberos is securer. The consumer not just to validates the provider but also verifies the product to the clients with secure authentication.  

  • It offers a common interface between windows as well as other operating systems.  
  • The user login Smart Card gives much higher protection as it allows security with two factors, that's why except Option C other choices were wrong.
6 0
3 years ago
State the steps for opening Ms word Application ​
Charra [1.4K]

Answer:

Step 1: From the desktop or from your 'Start' menu, open Microsoft Word. Step 2: Click either File or the Office button at the top left. Select Open and browse to the document you wish to open. Double-click on it with your left-hand mouse button to open it.

Explanation:

PLZ MARK AS THE BRAINLIEST

HAVE A GOOD DAY

: )

4 0
3 years ago
Start
Crank

Answer:

N=5  key task decision start and end

Explanation:

8 0
3 years ago
Other questions:
  • When a file has been opened using the 'r' mode specifier, which method will return the file's contents as a string??
    12·1 answer
  • In __________ write, the data are stored in the cache, and control returns to the caller. Select one: a. a synchronous b. a buff
    8·1 answer
  • When you use your fingerprint on a reader attached to your computer to authenticate yourself as the legitimate computer user, wh
    6·1 answer
  • Which of the following is necessary to effectively navigate online?. A. You must be able to identify important questions. B. You
    12·1 answer
  • Assume that a is an array of two or more integers, and that b and c are integers.
    13·1 answer
  • To display the entire entry for a calculated field, select the column in the Field row, right-click to display the shortcut menu
    15·1 answer
  • On a computer with two or more cpus, ____ is a technique in which each processor or core works on a different job.
    15·1 answer
  • In a _______ format, the date line and the signature block are centered.
    6·1 answer
  • The rules on the Internet for how messages are addressed and passed on are called ____ .
    15·1 answer
  • PLEASE HELP 10 POINTS!!!Click this link to view O*NET’s Work Activities section for Human Resources Managers. Note that common a
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!