1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
3 years ago
10

To set up or modify a saved object in Access use the

Computers and Technology
1 answer:
vovangra [49]3 years ago
4 0
A primary view saved object in
You might be interested in
i need a moderator or someone to answer this :/ why do i keep getting notifications that i have a new chat or a new answer/comme
Lyrx [107]

Answer:

It happens to me as well. Maybe check emails?  It could also be a bug.

Explanation:

4 0
3 years ago
Read 2 more answers
Which of these methods can you use to insert a new row in a worksheet?
vodka [1.7K]

Answer:

I think It should be B

Explanation:

If wrong so please sorry

3 0
3 years ago
7.4.4: Length of User's Name
Natalija [7]

Answer:

user_name = input("input user name: ")
print(len(user_name))

Explanation:

input - input function in python

len - length of value

print - print data

6 0
2 years ago
What is the purpose of the boot loader during the bootup process
earnstyle [38]
To start up windows and boot the system to make sure no hackers or viruses are on windows so your computer does not get infected with a hacker or virus 

hope this helps 
6 0
3 years ago
Read 2 more answers
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
Other questions:
  • _____ is a method of delivering software, in which a vendor hosts the applications, and customers access these applications over
    10·1 answer
  • Windows enables each user to establish a ____, which identifies to windows the resources, such as apps and storage locations, a
    6·1 answer
  • PLS HELP!!
    13·1 answer
  • Dani needs to present a mathematical formula to his audience. How should he start the process of adding an equation to a slide?
    5·1 answer
  • Create a program in Matlab that prints the numbers from 1-100.
    11·1 answer
  • Hotels and motels that are part of a ________ share a centralized reservation system and a common image, logo or advertising slo
    7·1 answer
  • How many bits would be needed to count all of the students in class today there is 20 students
    6·1 answer
  • In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures and processe
    8·1 answer
  • Question 1
    13·1 answer
  • What is processing requirement in computer?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!