1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrei [34K]
3 years ago
12

To include totals and other statistics at the bottom of a datasheet, click the ____ button on the HOME tab to include the Total

row in the datasheet.a. Statisticsb. Add Totalc. Insert Totald. Totals
Computers and Technology
1 answer:
Andrej [43]3 years ago
4 0

Answer:

D. Totals

Explanation:

Just like the microsoft excel spreadsheet, the microsoft access datasheet has similar tools. Although it is used to create and query databases, some functions carried out is excel can be done in access as well.

In the status bar at the bottom of the screen, certain parameter can be displayed for easy reference. If the totals or other statistical values needs to be included in the bottom status bar, go to the home tab and click on the "Totals" button.

You might be interested in
which of the following elements should be included within a screenplay (select all that apply) anwser choices provided in the pi
ale4655 [162]

Answer:

dialogue

Explanation:

3 0
3 years ago
David Rosen is credited with the development of which of these games?
nikklg [1K]
David Rosen is the CEO and lead programmer of Wolfire games. some of their games include Overgrowth, Desperate Gods, and Receiver.
4 0
4 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
RideAnS [48]

Answer:

True.

Explanation:

A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.

Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.

6 0
3 years ago
What is redundancy? What problems are associated with redundancy?
Anarel [89]

Answer:

Redundancy is the mechanism that occurs in database's data as the same data is stores in the multiple location.It creates repeated data by accident or for backup purpose.

The issues that arise due to the redundancy of the data is the storage space in database gets consumed and thus wastes the space in storing information in multiple locations.When any update occurs in the stored data's field value , it also has to be changed in the multiples occurrences.

5 0
4 years ago
Q) a materialized view is generally built using
NARA [144]
It does not matter its is just a view and is not required to store data
3 0
3 years ago
Other questions:
  • ________ symbol is used in the "Advanced" section of the time range picker to round down to nearest unit of specified time.
    8·1 answer
  • 1. What does it mean to say that a country’s land area is positively correlated with its population?
    12·2 answers
  • When you are driving on a rural road, if your right wheels run off the pavement, you should hold the steering wheel firmly and?
    10·2 answers
  • In a bubble sort, you use a(n) ____ loop to make pair comparisons.
    5·1 answer
  • What kind of security features does Microsoft Security Analyzer promise?
    5·1 answer
  • All living organisms make up the (4 points)
    8·1 answer
  • What is the most efficient<br> form of transportation we<br> have?
    13·2 answers
  • SOMEONE PLEASE HELP ME I REPOSTED THIS 3 time and no ONE HAD HELPED ME
    15·1 answer
  • Computing devices translate digital to analog information in order to process the information
    12·1 answer
  • Maria needs to use a requirement-gathering method that will help her provide a set of questions to the client. Which method shou
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!