1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
5

The ________ view in access looks similar to an excel spreadsheet.

Computers and Technology
1 answer:
ch4aika [34]3 years ago
6 0
Datasheet 
<span>The datasheet view in access looks similar to an excel spreadsheet.</span>
You might be interested in
Hey guys im just curious.... whats ur favorite number
Oksana_A [137]

Answer:

13

Explanation:

8 0
3 years ago
Read 2 more answers
Which of the following is the fastest processor
Nookie1986 [14]
Usually a Xeon is the fastest. Matters what time it was built and the chipset. If its old, the i7 is faster.
6 0
4 years ago
Consider the following code segment which makes use of the list deck and the positive integer i: Which of the following could be
ANEK [815]

Answer: A) Steve Andrew Kevin

B) Alex Joe Matt C) Sally Heather Barbie D) Tim Tim Tim

Explanation:

6 0
3 years ago
Refer to the exhibit. what is the administrative distance value of the route for router r1 to reach the destination ipv6 address
FromTheMoon [43]
The administrative value of distance of the route refer to the exhibit, for the router r1 to reach the destination ipv6 address of 2001:db8:cafe:4::a is 120. !220 is the administrative distance value of the route between the router r1 to reach the destination of ipv6 address.
6 0
3 years ago
The base fine is $35.0 and the hourly rate is $10.0 per hour. The parking meter is in minutes and it is rounded up to hours for
mr_godi [17]

Answer:$45

Explanation:I am assuming it has been an hour? $35 base fine and $10 for hourly rate.

5 0
4 years ago
Other questions:
  • You are given a network of 10.50.24.0/21, which contains 2,048 addresses. what subnet mask should you use to divide this into fo
    7·1 answer
  • Are video games considered information technology
    9·2 answers
  • ______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
    12·2 answers
  • You want to make it possible for your smartphone to share its internet access wirelessly with your friends device which of the f
    10·1 answer
  • A technician attempts to run an executable file on a Linux computer but receives a Permission Denied message.
    11·1 answer
  • The autocorrect feature can automatically capitalize the first letter in the names of days. true false
    15·1 answer
  • You are configuring two PCs for your network, PC-A is given an IP address of 192.168.1.18 and PC-B is given an IP address of 192
    15·1 answer
  • What will the computer do in response to a line of code reading # name = input("What is your name?")
    7·1 answer
  • please write out an accurate code for the question below also please explain or I'll report you ( Thanks :) )
    11·2 answers
  • * Describe the five components of a<br> computer
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!