1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
10

Which of the following is a/are question(s) that you should ask before you create an Access report?

Computers and Technology
1 answer:
never [62]3 years ago
5 0

Answer: All the above questions should be asked

Explanation:  Access report are the reports in access which provides the summarized and formatted information display in database. The information in the database is extracted from tables.The access report requires purpose of the report before preparation and the accessing users information to be known .

It is asked to make sure about that no unauthorized access of the report can take place. Distribution of the report among the other user or client is also a major question to be asked as to keep the record of the accessing of access report..Thus, all the question mentioned in the options are correct.

You might be interested in
Explain how the number of jobs available to workers has been affected by the use of ICT in commerce and industry, using specific
blondinia [14]

Answer:

The main cause of lack of jobs is due to automation and the ability for computers to do everything faster, more efficiently and effectively.

Explanation:

A specific example - Data entry jobs are redundant from automation programs

- Economic Forum predicted a net increase of 58 million jobs for automation, so this accounts for losses but isn't case specific to data entry

6 0
2 years ago
How does a router handle a packet destined for a network that is not listed in the routing table?
kogti [31]
The packet is dropped or discarded. By default, a router will send packets to a network that has been listed in the routing table. If it happens that the network is not listed, the packet will be discarded or dropped. Packets that do not have a default route or gateway of last resort are dropped.

 






5 0
3 years ago
after a few weeks of using facial recognition login, your infrared camera fails, and you are asked to enter your pin. because it
riadik2000 [5.3K]

The reason that you have not been locked out after several failed PIN login attempts is that your laptop does not have a TPM chip, and you have not set up BitLocker for lockout.

Technology known as Trusted Platform Module (TPM) is made to offer hardware-based, security-related functionality. Designed to perform cryptographic operations, a TPM chip is a safe crypto-processor. Malicious software cannot interfere with the TPM's security capabilities, and the chip has numerous physical security features to prevent tampering. Utilizing TPM technology has a number of major benefits, including the following:

  • Cryptographic keys should be created, stored, and used sparingly.
  • Utilize the burnt-in RSA key of the TPM to authenticate platform devices using TPM technology.
  • By recording security metrics, you can assist in ensuring platform integrity.

To learn more about TPM click here:

brainly.com/question/10742732

#SPJ4

7 0
1 year ago
What does modulate your voice mean
alexandr1967 [171]
To modulate your voice is to modify or gain more control of your voice. It basically means to change or adjust the pitch or tone.
7 0
3 years ago
Read 2 more answers
The number of colors in a bitmap image determines which category the image will be in. Complete the following sentences.
Jobisdone [24]

Answer:

Explanation:

1.Grayscale

2.Multitone

7 0
3 years ago
Other questions:
  • Bunch of points!!!!!!! help pls
    11·2 answers
  • People with healthy media diets:
    12·1 answer
  • A _____ is a predefined text format that includes multiple formatting options.
    14·1 answer
  • Can somebody help me?
    11·1 answer
  • Cookies are to improve the access of internet information. Therefore for the sake of you own privacy and security you should not
    8·2 answers
  • The correct order of operations is _____. brackets, exponents, division, multiplication, addition, and subtraction subtraction,
    5·2 answers
  • Upon looking out at the
    8·2 answers
  • What stores all software and files on your computer and reads and writes data onto a spinning magnetic or optical disk?
    6·1 answer
  • Where to get industrial circuits far cry 6
    8·1 answer
  • What options are available for storing backups, physically?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!