Answer:
a) range check
Explanation:
Validation can be defined as an automatic computer check that is designed to ensure any data entered is sensible, consistent, feasible and reasonable.
Basically, there are five (5) main validation methods and these includes;
I. Presence check: checks that the user enters (inputs) data into the field. It ensures a field isn't accidentally left blank.
II. Length check: checks that the data entered isn't too short or too long. It ensures that the data meets the minimum characters.
III. Type check: checks that the data entered is in the right format. For example, string, integer, float, etc.
IV. Check digit: checks that the digit entered is acceptable and consistent with the rest of the digits.
V. Range check: checks that the data entered is between the accepted lower (minimum) and upper (maximum) level.
Hence, range check is a validation type you would use to check that numbers fell within a certain range.
For example, 0 < x > 1000 is a range check.
Answer:
nasaan po yung tanongkkkkk
Answer:
Internet Protocol (IP)
Explanation:
The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.
Answer:
The domain suffix/TLD .edu is reserved for colleges and universities
Examples:
harvard.edu
stanford.edu
juilliard.edu
Answer: ECC (Error-correcting code) memory
Explanation: Error correcting code memory is the memory that has the capability of detection and correcting the error arising in the data.The internal data is the most effected data from the corruption and damage.It is the memory used in the computer and other operating system because it has less tolerance towards data corruption.
The technician should use the ECC memory for the building of the client station.This will protect the system and the data from getting in any circumstance.