1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
4 years ago
10

Which of the following is a/are question(s) that you should ask before you create an Access report?

Computers and Technology
1 answer:
never [62]4 years ago
5 0

Answer: All the above questions should be asked

Explanation:  Access report are the reports in access which provides the summarized and formatted information display in database. The information in the database is extracted from tables.The access report requires purpose of the report before preparation and the accessing users information to be known .

It is asked to make sure about that no unauthorized access of the report can take place. Distribution of the report among the other user or client is also a major question to be asked as to keep the record of the accessing of access report..Thus, all the question mentioned in the options are correct.

You might be interested in
g You need to build a circuit to perform parallel data transfers from one set of registers to another. The interconnections betw
Phoenix [80]

Answer:

JK Flip Flop

Explanation:

Flip Flops is a fundamental building blocks of digital electronics systems.  It  is an electronic circuit with two stable states that can be used to store binary data.  However, a JK Flip Flop is a type of universal flip-flop that makes the circuit toggle between two states and is widely used in shift registers.

So when building a circuit to perform parallel data transfers from one set of registers to another, a JK Flip Flop is the best choice he register FFs when you need to hold the interconnection between the register to a minimum.

6 0
4 years ago
Read 2 more answers
Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens
Angelina_Jolie [31]

He experienced phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Here are some measures to avoid phishing. You can pick up the one you liked the most

  • Always check the spelling of the URLs in email links before you click or enter sensitive information
  • Watch out for URL redirects, where you're subtly sent to a different website with identical design
  • If you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply.
  • Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media
5 0
3 years ago
Which two hardware features would a technician monitor within the bios if a computer was suspected of overheating?
Firdavs [7]
I would say probably the CPU Fan and the CPU clock speed 
4 0
3 years ago
Which of the following questions will most likely be answered by displaying data on a line graph?
Artemon [7]
I'm pretty sure the answer is b
4 0
3 years ago
When Cloud Consumers are automatically redirected to the new cloud storage device?
Taya2010 [7]

Answer:

Cloud architecture are basically depend upon the storage replication system and it keeps synchronize the primary cloud data in the duplication storage.

And the redundant data is used when the logical unit number are migrated from one place to another. Then, it creates a copy of logical unit number.

Whenever, the primary device fail the storage path diverts the request of cloud user in secondary logical unit number and it automatically redirect to new cloud device storage.

6 0
4 years ago
Other questions:
  • What is difference between actual parameters and formal parameters in java?​
    8·2 answers
  • Which phase takes all the detailed design documents from the design phase and transforms them into the actual system? Testing ph
    7·1 answer
  • Write a program that prints the day number of the year, given the date in the form month-day-year. For example, if the input is
    9·1 answer
  • Which of the following is not a metamorphic agent?
    8·2 answers
  • How does limiting a company's scope benefit the company?
    15·2 answers
  • James added a new video card and needs to get a power supply that will have enough power to run the new card. When researching t
    5·1 answer
  • Which type of RAM is used exclusively in laptops?<br> a) SODIMM<br> b) DDR3<br> c) DDR<br> d) DDR4
    15·1 answer
  • Write an algorithm that gets as input your current credit card balance, the total dollar amount of new purchases, and the total
    8·1 answer
  • Explain the procedure you will undertake to create a new partition​
    11·1 answer
  • G The method of mapping where each memory locationis mapped to exactly one location in the cache is
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!