1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
13

A rang check that could be use to validate... Date and time

Computers and Technology
1 answer:
lisov135 [29]3 years ago
5 0

A range check is often used when a person works with data consisting of numbers, dates and times, or currency, ensuring that a number is within a specific range.

Explanation:

  • Range checks allow a person to set suitable boundaries.
  • An example of a range check is checking to see if the value of a 16-bit integer is within the capacity of a 16-bit integer. When a range check is performed, upper and lower boundaries are specified.
  • Range check is a validation check which can be applied to numeric fields. This is done to ensure that only numbers within a certain domain can be entered into a field. Remember that this does not necessarily mean that the data entered will be correct. But it will certainly lie within reasonable limits.
  • A method of validation which checks that data falls between an upper and lower acceptable value.
  • This validation check which can be applied to numeric fields. This is done to ensure that only numbers within a certain domain can be entered into a field. Remember that this does not necessarily mean that the data entered will be correct. But it will certainly lie within reasonable limits.
You might be interested in
One of your co-workers has been issued a new smart card because the old one has expired. The co-worker can connect to the comput
Lady_Fox [76]

Answer:

The answer is "The global Address List (GAL) is publishes in the new certificates".

Explanation:

Describe the GAL with relate to smart card:

  • The GAL is a part of the outlook, that allows the users to make a group of mutual contacts and resources specified for your G Suite domain and searchable directory.  
  • It provides the main mail app, that offers you to make global contacts, and also provides basic contact, with the use of business shares global addresses with others.  In this process, the co-worker can change their smart card.
5 0
3 years ago
Which of these about non-disclosure agreements is accurate?
grandymaker [24]

Answer: number 2

Explanation: number 2

6 0
3 years ago
Read 2 more answers
Six security issues and six descriptions are shown below.
Trava [24]

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question contains six securities terms and definitions.

The goal of this question is to properly map the term to its correct description/definition.

You can find the complete mapping in the attached image.

7 0
3 years ago
If you are weak or lacking in an area or skillset, what kinds of things can you do to compensate or improve?
Ilya [14]
Put some more of your time to help improve that skill.try to learn to get better.
6 0
3 years ago
FS EVERFI:
Snowcat [4.5K]

Answer:

A) work study program

Explanation:

Because you need experience and scholarships don't always pay, so this is the best choice.

6 0
2 years ago
Read 2 more answers
Other questions:
  • Why do we need the Domain Name System (DNS)? Given the domain name www.flamingflamingos.eu, what is the top level domain in this
    5·1 answer
  • Yahoo! allows users to create personalized my yahoo! pages. users can add or delete a variety of information from their personal
    8·2 answers
  • how much should an organization consider moving into the cloud before full outsourcing starts making more business sense
    14·2 answers
  • Henry Ford would have been most interested to bring which modern innovation to his automotive factories?
    5·2 answers
  • Una pregunta cuales son los ataques de Sindel que por favor y me lo diga gracias
    11·1 answer
  • What is an elliptic curve cryptosystem (ECC)?
    8·1 answer
  • After you configure backup settings using the backup plugin, backup jobs will run automatically and start taking backups at the
    13·1 answer
  • Which programming languages are the best choices for desktop applications? Select 3 options.
    8·2 answers
  • The most significant concerns for implementation of computer technology involve _______, security, and ethics. accuracy property
    10·1 answer
  • Write a single instruction that inverts bits 5 and 6 in the bl register
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!