1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
7

Access data is _ in a word document

Computers and Technology
1 answer:
Sunny_sXe [5.5K]3 years ago
5 0

Answer:

embedded

Explanation:

The access data object is linked or embedded in a word document. We can embed or link excel data sources as well as various others, and there is a long list of data sources allowed. The access data source is also one of the data sources that can be linked or embedded in the word file. Remember that we can link or embed these data sources in the word file, and linking and embedding are two different things. The technology is known as OLE technology.

You might be interested in
Arturo is a security professional. He is strengthening the security of an information system. His design ensures that if a field
Cloud [144]

Arturo is attempting to protect the database (data) of an information system (IS).

<h3>What is an information system?</h3>

An information system (IS) can be defined as a set of computer systems, that is typically used to collect, store, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products.

In Cybersecurity, there are two (2) main techniques that can be used to check data when inputted in an information system (IS) and these include:

  • Verification
  • Validation

Data validation is a type of check which is primarily performed by a software program (application) to make sure that the data which is entered into an information system (IS) is allowable and sensible.

This ultimately implies that, any data that is not allowed or sensible are rejected and discarded by the computer system.

In conclusion, we can deduce that Arturo is attempting to protect the database (data) of an information system (IS).

Read more on data here: brainly.com/question/25885448

3 0
2 years ago
Which of these statements is true about database reports? A. A generated report will include all records in the database. B. A g
weeeeeb [17]

B. A generated report will include all records that a query fetches.

6 0
3 years ago
What are the main techniques used to help manage test anxiety? Check all that apply.
Aleks04 [339]

Answer:

1) Avoid the perfectionist of trap

2)Banish the negative thoughts

3) Get enough sleep

4) Make sure you are prepared

5) take deep breaths

Explanation:

In my thought it's the answer of this question.

4 0
2 years ago
Read 2 more answers
Identity any five system unit components and explain the use for each [apart from processor]<br>​
saw5 [17]

Answer:

RAM

ROM

PROCESSOR

MOTHER BOARD

HARD DISK

Explanation:

Random access memory or RAM store data temporary

Read only memory or ROM permanently store data and have a programming needed to start (PCs) or other electronic device

CPU or processor refers to brain of computer

Mother board the main internal hardware component of system unit

Hard disk is electro mechanical data storage

8 0
3 years ago
Please check my answer! (Java)
gtnhenbr [62]

13 is the correct answer.

7 0
3 years ago
Other questions:
  • Jeremy, a college student, is preparing to give a speech on "Social Responsibilities." He refers to a Web page on a tab using
    10·1 answer
  • Keisha has been asked to give a presentation about a new method for processing customer returns. The first thing she should do i
    11·1 answer
  • A musical compact disc is an example of
    13·1 answer
  • What is FireWire?
    7·2 answers
  • Megan has written the following rough draft for her assignment. Choose the correct way to complete each sentence. Sarah is creat
    13·1 answer
  • Design and implement an application that reads a sequence of up to 25 pairs of names and postal (ZIP) codes for individuals. Sto
    9·1 answer
  • application that will perform a lot of overwrites and deletes of data and requires the latest information to be available anytim
    8·1 answer
  • A keyboard and touch screen are the most common of ________ devices. select one:
    11·1 answer
  • A ________ algorithm is a method of locating a specific item of information in a larger collection of data.
    8·1 answer
  • Kenny is asked to submit a photo for the annual photographic competition. He decided to capture a photo with the light-painting
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!