1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
9

To exit Access, click the ____ button on the right side of the Access title bar.

Computers and Technology
1 answer:
Natalka [10]3 years ago
5 0
Click the Close button
You might be interested in
For a list of numbers entered by the user and terminated by 0, find the sum of the positive number and the sum of the negative n
Katena32 [7]

Summarize all positive numbers as follows: + It's good. The total of all negative numbers is:, write it down. + Unfavorable.

<h3>What is C++ language?</h3>

C++ language is defined as a general-purpose programming language that supports procedural, object-oriented, and generic programming and is case-sensitive and free-form.  As well as being used for in-game programming, software engineering, data structures, and other things, C++ is also utilized to create browsers, operating systems, and applications.

An application that adds all positive integers and stores them in variables, as well as adding all negative numbers and storing them in variables. The software should print the values for both variables at the conclusion and compute their average. When the user enters a zero, the software should terminate.

Thus, summarize all positive numbers as follows: + It's good. The total of all negative numbers is:, write it down. + Unfavorable.

To learn more about C++ language, refer to the link below:

brainly.com/question/1516497

#SPJ1

8 0
1 year ago
5 band resistor with two red bands, two gold bands, one purple band?
Mamont248 [21]

According to below picture, two gold bands on a 5 band resistor cannot happen. What is the order of the bands?

8 0
3 years ago
If you experience a denial-of-service attack, you can use firewall logs to determine the _______ from which the attack originate
suter [353]
<span>The answer is IP address.  If you experience a denial-of-service attack, you can use firewall logs to determine the IP address from which the attack originated.</span>
6 0
3 years ago
Read 2 more answers
Write a detailed three page report that summarizes how data scientists are utilizing data mining to predict future trends and be
LiRa [457]

Answer: given in the explanation

Explanation:

Data mining is referred as an automated processing tool used for sorting and analyzing enormous data and information which indeed are ``aimed towards effectively identifying trends and patterns and establishing relationships to solve business problems and generate new opportunities. Furthermore data mining techniques also helps to predict what’s going to happen in the future and act accordingly to take benefit of forthcoming tendencies.

Data mining is applied to a variety of large-scale data-processing activities such as collecting, extracting, warehousing and analyzing data. It also includes decision-support applications and technologies such as business artificial intelligence and machine learning and is used in varied areas of business research such as product development, sales and marketing etc.

Data mining is for taking advantage of data to predict ;

  • Mathematical algorithms, and, data are used for predictive analytics. One can capture information, and, use it to model sales pattern, trends, and, customer behaviour
  • Data mining uses algorithms to extract, and, analyze information; discover hidden patterns
  • It uses data patterns, and, is thus closely tied to machine learning
  • Historical & current information is used to predict future trends

Data mining can be used for the following:

  • Data mining in gas & oil operations - Mining data in gas & oil operations involves committing to key technologies, and, processes; and, embracing new ways of thinking & problem-solving. Firms can use exploratory data analysis, modelling techniques & model development; approaches to put models into production
  • Big data - Performance computing & advanced analytics
  • Magic Quadrant - Evaluate 16 vendors to identify the right ones
  • Heavy reading, network analytics - Optimize network; evaluate network performance; provide targeted marketing; fine-tune capacity.

5 0
4 years ago
DNS forwarding can be set up so that if the DNS server that receives the forwarded request cannot resolve the name, then the ser
hoa [83]

Answer:

Nonexclusive forwarding

Explanation:

In Nonexclusive forwarding, DNS forwarding is setup so that if the DNS server receiving the forwarded request cannot resolve the name, then the server that originally forwarded the request makes an attempt to resolves it. If that fails, the server sends a request to its designated forwarder.

8 0
3 years ago
Other questions:
  • A motor controller controls the and of the motors.
    9·1 answer
  • A claim that is printed and mailed to the carrier site is called a _______copy?
    13·1 answer
  • which of the following scenarios is a circumstance in which it would be ethical to practice confidentiality?
    8·1 answer
  • Uploading is the process of transferring existing content stored on a server or other computer or device to your device via a ne
    8·1 answer
  • Given the scenario, before leaving the office, you ask the CIO to provide which formal document authorizing you to perform certa
    11·1 answer
  • You are required to justify the need to implement a three-tier campus network. Which justification below makes sense for a three
    6·1 answer
  • A(n) ____ allows others besides the manufacturer to develop software to run on the system or device.
    14·1 answer
  • Write a switch statement that tests the value of the char variable response and performs the following actions: if response is y
    9·1 answer
  • Ron is creating building blocks in Word. How can he make the building blocks that he created available?
    8·2 answers
  • HELP ASAP!!!!<br> I don't know the code to these images and I need that code now.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!