1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fed [463]
3 years ago
9

To create a new query in Design view, click CREATE on the ribbon to display the CREATE tab and then click the ____ button to cre

ate a new query.
A. Select Query
B. Design view
C. Query
D. Query design
Computers and Technology
1 answer:
irakobra [83]3 years ago
4 0

Answer:

The answer is "Option D".

Explanation:

Query design is a part of the Microsoft Excel, It is used to constructs the queries that is use for reading, adding, removing, and modifying data into the database.  In this query get the correct set of information that hits hundreds of (inner and outer) junctions, sub queries, and temporary tables, and other options are not correct which will explain as follows:

  • In option A and option C is not correct because it is used for design and show data after execution of query.
  • In option B, Design view is used for show data, It is used after query design, that's why it is not correct.

You might be interested in
1. The goals of the Safety Office of the Department of Transportation include______.
Lesechka [4]
The correct answer is D
5 0
3 years ago
Which of the following is not a recommended method to protect you from identity theft?
yaroslaw [1]

Answer:

post them, but id say anything with personal information

7 0
3 years ago
What other identifiers would you need to alter in a cloned virtual machine to be sure it was unique? What might happen if these
Romashka [77]

Answer:

Following identifiers needs to be altered in cloned VM.

  1. Changing the IP address
  2. Selecting Ethernet Ports
  3. Rename the Pointers
  4. Renaming the Second Disk Drive
  5. Host names must be unique
  6. Rename the VM name

Explanation:

When we clone the VM, we have to make sure that Cloned VM should have unique system information and network addresses in and out of guest OS.

If UUID’s of all cloned VM's are different then DHCP will get separate ip addresses for those. Suppose if the IP addresses are static or If the IP address was hardcoded then it has to be changed to new IP address manually. If this is not done then it will cause duplicate IP’s and will cause networking issues.

When Cloned VM is created then the ethernet port has to be chosen correctly to make sure that LAN networking is correct.

You should specify the disk capacity. If you choose disk capacity as single file then it will create one vmdk file. So, specify the correct disk capacity, If you did not choose the disk file as single file then you may end up having multiple .vmdk files. So in that case you need to rename the pointers of copy of vmdk files.

Rename the Second Disk Drive. For example : You may find two VM files with VM Copy.vmdk, So you have to rename second disk to VM Copy-1.vmdk or any other name.

The cloned VM copies the parent virtual machine and it also includes the VM name. To avoid problems caused by having VM's with duplicate names on the network, give the VM in the cloned VM a unique name.

You have to make sure that hostnames are different as well. Hostname resolution will lead to conflict if its same on both VM's.

7 0
4 years ago
Which of the following is NOT true about adjustment layers? brainbuffet
otez555 [7]

Answer the adjustment layers can not be used a lot?

Explanation: i think that was it

6 0
3 years ago
A state in which two things are able to exist or occur together without problems or conflict...
VladimirAG [237]

Answer:

Compatibility

Explanation:

that's the definition of compatibility.

4 0
3 years ago
Other questions:
  • g Write a program that asks for the weight of a package and the distance it is to be shipped. This information should be passed
    11·1 answer
  • What channel will the republian debate be broadcast on?
    6·2 answers
  • Alicia uses a software application to store the names, email addresses, and phone numbers of her friends in alphabetical order. 
    11·1 answer
  • Alison is having a hard time at work because her Inbox is flooded with emails every day. Some of these emails are unsolicited. S
    6·1 answer
  • What is binary number system? Why is it used in computer system?
    13·2 answers
  • When converting text to a table, which feature should be used?
    12·1 answer
  • How do mark somebody as brainliest??
    14·1 answer
  • What is the name of the most popular American computer repair shop?
    9·2 answers
  • Which type of information should never be given out on social media?
    5·2 answers
  • Silicone rubber and urethane caulks generally give the ____________ overall performance for exterior building envelope applicati
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!