1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
13

A rang check that could be use to validate... Date and time

Computers and Technology
1 answer:
lisov135 [29]3 years ago
5 0

A range check is often used when a person works with data consisting of numbers, dates and times, or currency, ensuring that a number is within a specific range.

Explanation:

  • Range checks allow a person to set suitable boundaries.
  • An example of a range check is checking to see if the value of a 16-bit integer is within the capacity of a 16-bit integer. When a range check is performed, upper and lower boundaries are specified.
  • Range check is a validation check which can be applied to numeric fields. This is done to ensure that only numbers within a certain domain can be entered into a field. Remember that this does not necessarily mean that the data entered will be correct. But it will certainly lie within reasonable limits.
  • A method of validation which checks that data falls between an upper and lower acceptable value.
  • This validation check which can be applied to numeric fields. This is done to ensure that only numbers within a certain domain can be entered into a field. Remember that this does not necessarily mean that the data entered will be correct. But it will certainly lie within reasonable limits.
You might be interested in
How do i delete a question ?
seraphim [82]

i think we can't do that

7 0
3 years ago
The contents of a four-bit register are initially 1011. The register is shifted six times to the right, with the serial input be
balu736 [363]

Answer:

First shift - 1101

Second shift - 0110

Third shift - 1011

Fourth shift - 1101

Fifth shift - 0110

Sixth shift - 1011

Explanation:

Each time you shift a register to the right, you do 3 things:  

  • The rightmost digit drops off
  • You move the next three digits over one position to the right
  • You fill in the leftmost position with one of the numbers from your serial input.

Contents are initially 1011.  The 1 on the right disappears.  The leftmost 3 digits (101) end up in the last 3 positions of the register.  The first position of the register takes a number from the serial input, which is 1 in this case.  So you end up with 1101.

Do this a second time.  The rightmost 1 is gone, the 110 end up as the last 3 positions of the register, and you end up with 0 in the leftmost position.  This one is 0110.

The remaining 4 follow the same pattern.

4 1
3 years ago
​
mash [69]

Answer:

Hey mate......

Explanation:

This is ur answer....

<em>For many users, uploading files is quite a bit slower than downloading files. This is usually normal, because most high-speed Internet connections, including cable modems and DSL, are asymmetric — they are designed to provide much better speed for downloading than </em><em>uploading.</em>

Hope it helps!

Brainliest pls!

Follow me! ;)

5 0
3 years ago
Algorithm<br> Read marks and print letter grade according to that.
Romashka-Z-Leto [24]

Answer:

OKAYYYY

Explanation:

BIJJJJJJJSGJSKWOWJWNWHWHEHIWJAJWJHWHS SJSJBEJEJEJEJE SJEJBEBE

3 0
3 years ago
Which BEST describes how the author’s purpose is revealed? A) The speaker appeals to the emotions of the audience in section 10.
tatiyna

You probably meant languge arts not Tech.

Anyways I will not be sure unless I read the book but..C most of the time is correct sooo sorry I can't help much unless I read the book

I would suggest <u>B) The speaker appeals to the emotions of the audience in section 9.</u>

<u />

I'm also sorry that I'm late but I hope someone else who searchs this up can use this

<u></u>

<u>Sorry If I'm wrong</u>

8 0
3 years ago
Other questions:
  • A number used to encrypt data is called a(n ________. signature key cookie escrow
    10·1 answer
  • What is a BINARY, bits and bytes ​
    5·1 answer
  • Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, a
    14·1 answer
  • Assume that a is an array of two or more integers, and that b and c are integers.
    13·1 answer
  • Which of these identifies the intersection of row 16 and column D?
    14·1 answer
  • A crane is attempting to lift a beam that exceeds its load rating. What type of accident is possible?
    9·1 answer
  • 2.<br> The force of impact is
    5·1 answer
  • How can goal setting help with academic performance?
    15·1 answer
  • ……………………is one of the most popular cloud storage facilities.​
    11·1 answer
  • Database policies should be created and implemented by all organizations, regardless of the ________ of the organization.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!