1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antoniya [11.8K]
3 years ago
6

a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style

that demonstrates your understanding of the difference between a Microsoft Access database and an Excel spreadsheet by comparing the features of each and when they would be used as personal computer applications if applicable.
Computers and Technology
1 answer:
masha68 [24]3 years ago
8 0

Explanation:

Both perform almost the same function of storing data, performing numerical calculations, formating cells, and to generate reports.

However, when dealing with data that is short term (requiring less updating) Microsoft Excel is recommended as it provides easy spreadsheet functions. Access on the other hand is a more complex application for data analysis involving constantly changing data values that are long term based. Access allows for efficient data analysis using complex tools such as import module, automated queries etc.

You might be interested in
what component of virtualization controls all physical memory, and thus has the ability to make any unused memory pages in each
svlad2 [7]

Since the hypervisor, a component of virtualization, is in charge of managing all physical memory, it can make any memory pages left over in each guest virtual machine available to other virtual machines or the host computer.

<h3>What Exactly Is A Hypervisor?</h3>

A hypervisor is a class of computer software, firmware, or hardware that builds and manages virtual machines (also known as a virtual machine monitor, VMM, or virtualizer). A host machine is a computer on which a hypervisor is running one or more virtual machines, and a guest machine is a specific virtual machine. The hypervisor controls how the guest operating systems are executed and provides them with a virtual operating environment. The visitor often uses the native hardware to carry out instructions, unlike an emulator. The virtualized hardware resources may be shared by several instances of various operating systems. For instance, Linux, Windows, and macOS instances can all operate on a single real x86 computer. Contrastingly, with operating-system-level virtualization, each instance (often referred to as a container) only needs to share a single kernel, while the guest operating systems—such as various Linux distributions using the same kernel—can differ in user space.

To know more about Softwares, visit:

brainly.com/question/1022352

#SPJ4

6 0
1 year ago
Add my sna-p dkarpik58?...
BARSIC [14]

<u><em>This is for answers not snap</em></u>

7 0
3 years ago
Why should you limit what information is in your digital footprint?
oee [108]

Answer:

Your “digital footprint” includes all traces of your online activity, including your comments on news articles, posts on social media, and records of your online purchases. When you know the boundaries of your digital footprint and take steps to contain it, you can help protect your identity and your reputation.

Explanation:

3 0
3 years ago
Which of the following is most often added to safety glasses to provide better protection from impact and flying particles? A. S
Vesnalui [34]

the answer is side shields cause the side shields gives more protection to the eyes than just the lens because the flying objects and particals can still get into your eyes even with the safty glasses but with the side shields the total risk of injury percentage goes down because the side shields helps blocks the flying objects and particals that are trying to get into your eye from the side

8 0
3 years ago
If you are in a tornado situation which of the following should you NOT do?
Hunter-Best [27]
Three. A bridge can be put under immense pressure during a storm. In addition to that if a tornado has caused a storm surge the rising water could make you drown
5 0
3 years ago
Other questions:
  • Zara is designing a slide with a numbered label on a picture. She wants the number to appear when the she presses a button on th
    11·2 answers
  • Write a Java program to print the result in the series 10, 15, 20, 25, ..., 50. Hint: You can use an iteration statement for wri
    9·1 answer
  • What are the four primary factors described in the text that set the state for Web 2.0 or the social Web that we enjoy today??
    12·1 answer
  • (Game Design) A float is a blank space, used as a placeholder in an array<br><br> True or false
    13·1 answer
  • . Business-to-business integration (B2Bi) is vital for efficient and accurate flow of data across internal ISs and external busi
    11·1 answer
  • It chapter 2 pennywise
    13·1 answer
  • A network administrator recently implemented two caching proxy servers on the network. how can the administrator best aggregate
    5·1 answer
  • ________ is a computer-based network that triggers actions by sensing changes in the real or digital world.
    15·2 answers
  • What is the output?
    11·1 answer
  • a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!