1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
12

Data can be ___, ____ and ____ in your database using a form object​

Computers and Technology
1 answer:
Dahasolnce [82]3 years ago
4 0

Answer: stored and reference are the only 2 that came to mind

Explanation:

You might be interested in
A throw(...) statement is an alternative way to return from a function or method that indicates some kind of failure occurred.
WITCHER [35]

Answer:

a.True.

Explanation:

A throw statement is used to throw an exception from inside the method.Whenever the throw statement is encountered by the compiler and after that when it is executed the execution of the currently executing method is stopped and it returns back to caller.

There is also a keyword Throws which is used to tell the compiler that the method may throw one or more exceptions.

Hence we conclude that the answer is True.

6 0
4 years ago
Suppose that a laptop identifies its processor as follows: AMD’s A84500M. What does the AMD represent?
zalisa [80]

Answer:

Advanced Micro Devices

Explanation:

4 0
3 years ago
What are demographics? (with regards to marketing)
skad [1K]
Demographics are different groups of people you would want to appeal to. Ex. Women, Americans, Mexicans, Men, and Children.

And as always have a wonderful day user!
3 0
3 years ago
What effects convert colors in a picture to a wide variety of hues?
nadezda [96]
I believe it's color saturation.
3 0
3 years ago
Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens
Angelina_Jolie [31]

He experienced phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Here are some measures to avoid phishing. You can pick up the one you liked the most

  • Always check the spelling of the URLs in email links before you click or enter sensitive information
  • Watch out for URL redirects, where you're subtly sent to a different website with identical design
  • If you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply.
  • Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media
5 0
3 years ago
Other questions:
  • A customer has contacted you to help him alleviate the large amount of time and effort that goes into adding and removing users
    12·1 answer
  • Perception is a simple process.
    11·2 answers
  • The desktops of computers running the same OS all look the same
    8·1 answer
  • 1. The best program to present numerical data in would be ____. a. Access c. PowerPoint b. Excel d. Word
    6·1 answer
  • CHEMISTRY. metal+water》base+...............​
    12·1 answer
  • What is the answer to in Microsoft Word you can access the blank from the command command from the mini toolbar what is the corr
    10·2 answers
  • What would be the desired output of the home-security system
    8·1 answer
  • How can you have a safe browsing experience?
    10·2 answers
  • 5. In which of the following stages of the data mining process is data transformed to
    9·1 answer
  • Please help me what is an example of a growing trend on social media
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!