1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
12

Data can be ___, ____ and ____ in your database using a form object​

Computers and Technology
1 answer:
Dahasolnce [82]3 years ago
4 0

Answer: stored and reference are the only 2 that came to mind

Explanation:

You might be interested in
During World War II, the Battle of the Coral Sea was significant because it evened the naval strength of the Japanese and US fle
12345 [234]

Answer:

B

Explanation:

6 0
4 years ago
When a communication exchange that does not verify the identity of the endpoints of a communication and accepts any properly for
ELEN [110]

Answer:

True

Explanation:

When communication exchange that does not verify the identity of endpoints of communication is true

3 0
4 years ago
Consider the following sequence of page references: 1 2 3 3 4 4 1 4 1 3 4. Determine how many page faults will occur with LRU(Le
Vsevolod [243]

Answer:

7 page faults

Explanation:

I have created a small Java program that can be seen in the attached picture below. This Java program uses an LRU algorithm in order to find the number of page faults within an array of page references from the references given in the question. Using these references, and the java program we can see that there are a total of 7 page faults. This can be seen in the output highlighted by red in the picture below.

7 0
3 years ago
Which is a description of phishing?
kodGreya [7K]

Answer:

C. sending emails impersonating legitimate companies in an attempt to learn a recipient's personal information

7 0
3 years ago
Give three examples of NON-TRADITIONAL web authoring tools<br> 3 pour
olganol [36]
Some other type of authoring tools 1. Card or Page based tools 2. Icon based, event driven tools 3. Time based and presentation Tools.
4 0
2 years ago
Other questions:
  • Universal Containers is setting up an external Business Intelligence (BI) system and wants to extract 1,000,000 Contact records.
    11·1 answer
  • What is a nonlinear presentation
    9·2 answers
  • How is a cell named?
    9·1 answer
  • Chuck plans to go on a hiking trip. Before the hiking trip, Chuck's bank account has $129.50. He then spends $129.50 on hiking g
    6·1 answer
  • URGENT!!! Which file format is used mainly in the Microsoft Windows operating system?
    15·2 answers
  • Write a Python program that prints your name, CS classes taken (or other relevant experience), and the date on separate lines. U
    5·1 answer
  • How will Mario know which words are misspelled in his document?
    11·2 answers
  • Which of the following is an advantage of using
    6·2 answers
  • Is the most important characteristic of a hard drive.​
    7·2 answers
  • Explain the basic operations of a computer system​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!