1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
4 years ago
6

"As a ____ database management system, Access is particularly powerful because you can enter data once and then retrieve informa

tion from all or several tables as you need it. a. simple b. manipulative c. complex d. relational"
Computers and Technology
1 answer:
Galina-37 [17]4 years ago
7 0

Answer:

d.Relational

Explanation:

With the help of Access users can successfully manage valuable information by saving it easily for future reporting it , and analysis.In access users can have access to organized data in their database with minimal effort.

You can enter the data and you can select which data you want and use queries for that accordingly for example:- joins,select statements etc.

You might be interested in
When we put 10+ points for when we ask a question, do we loose the points we have?
Romashka-Z-Leto [24]

Answer:

<h2>no</h2>

it won't give away your points, it will give them 10+ points for every answer is posted. so it won't cost u any point for every question u ask. don't worry about it.

4 0
3 years ago
Universal Containers maintains Job information in a Custom Object that contains sensitive information. The only users who should
Elenna [48]

Answer:

C. Grant Access Using Hierarchy sharing setting on the Job Object set to false.

A. "Modify All" permission for Job Object on the Delivery Profile.

E. Organization-Wide Default sharing setting of Private on the Job Object.

Explanation:

In this example, we are dealing with sensitive information. We learn that because of this, the only users who should be able to view and edit job records are the user who owns the record and all users in the delivery profile. In order to protect the information, it is necessary to have an organization-wide default sharing setting of private. After this, we also need the "modify all" permission for job object on the delivery profile and the Grant Access Using Hierarchy sharing setting to be set to false.

7 0
3 years ago
If you are involved in a collision that results in property damage, injury, or death, you must call
mina [271]

 you would have to call all of them, so d.

7 0
3 years ago
A DFA is equivalent in power to an NFA. True False
sattari [20]

Answer: True

Explanation:

  Yes, the given statement is true that a DFA is equivalent to NFA in terms of power. For any type of NFA we can easily build an equal DFA so, the NFA are not much powerful as compared to DFA. Both NFA and DFA are characterized by a similar type of class.

DFA is a special case of NFA and They both defined in the same class of language. Each condition in the DFA get summarized by all the condition that the NFA has itself.

4 0
3 years ago
# 12/9/2020
EastWind [94]

where it says   " def main() " there needs to be something in the "()"

Hope this helps.   : )

3 0
3 years ago
Other questions:
  • Mr. Mathis asked his students to add a comment to a cell the students recorded the steps they followed in a chart. Which student
    12·2 answers
  • Assuming that t is an array and tPtr is a pointer to that array, which expression refers to the address of element 3 of the arra
    7·1 answer
  • We have three containers whose sizes are 10 pints, 7 pints, and 4 pints, respectively. The 7-pint and 4-pint containers start ou
    14·2 answers
  • All of the following are aspects of the search process except?
    6·2 answers
  • Compute (110110001.01)2 + (27.12)10 + (121.25)16 – (130.20)16 and display the answer in hexadecimal base.
    7·1 answer
  • After conducting interviews with several bad candidates, Althea, a manager at Langrover Inc. interviewed a candidate who was bet
    15·1 answer
  • You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?A. 255.25
    12·1 answer
  • What java syntax allows me to take user input.
    11·1 answer
  • Modern life is not possible if computer stops working? Give your opinion<br>​
    7·1 answer
  • Each high-level language has its own __________, or rules of the language. group of answer choices
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!