1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harman [31]
3 years ago
8

A field is _____. a complete entry in a database one of the categories in a database a group of twenty-seven records a cell in a

table
Computers and Technology
1 answer:
Assoli18 [71]3 years ago
8 0

Answer:

a cell in a table

Explanation:

Assume you have your Excel database sheet opened with records in it. Those records contain a piece of data placed in a single cell of the worksheet. This piece of data is what is called a field. Fields are normally placed in columns. You can define a field by giving it a column heading first and then choosing options of how to display, interpret and calculate the data that is inside.

You might be interested in
if you want to present slide to fellow student or co-workers, wich productivity software should you use to create them?
Reika [66]
Microsoft PowerPoint
6 0
3 years ago
Before entering a loop, the first input, or ____, is retrieved.
Virty [35]

Loop is a control structure that causes a statement or group of statements to repeat.Before entering a loop, the first input, or the accumulator where the total will be kept is retrieved to an initial value, usually zero.

3 0
3 years ago
I'd: 9872093250, password: qqqqq, join the meeting​
jenyasd209 [6]
No thanks but Happy Mother’s Day!!!
8 0
3 years ago
One emerging type of trojan horse is called a ____-access trojan.
Sliva [168]
<span>One emerging type of Trojan horse is called a remote-access Trojan (RAT).
</span> RAT is a malware program.  With this Trojan horse an intruder is given administrative control over a target computer. The RAT controls the system via a remote network connection as if by physical access. It is typically installed<span> invisibly with a user-requested program.</span>
3 0
4 years ago
I am a non-volatile type of built-in memory. I store my contents long-term. My job is to store critical programs that the comput
AlexFokin [52]

Answer:

read only memory (ROM)

Explanation:

Examples of non-volatile memory include read-only memory (see ROM), flash memory, most types of magnetic computer storage devices (e.g. hard disks, floppy discs and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cards.

7 0
3 years ago
Other questions:
  • Speech on inventors and inventions
    14·1 answer
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • PLS HELP!!
    13·1 answer
  • How long before a speech should you begin practicing?
    10·2 answers
  • Which of the following is a typical concern for developers while using prototypes?
    6·2 answers
  • Suppose a program takes 1000 machine instructions to run from start to end, and can do that in 10 microseconds when no page faul
    9·1 answer
  • An employee who interacts with customers regarding the nature of their car problems, rather than actually working on the vehicle
    6·1 answer
  • Which element is represented by the electron configuration in example B? Example B: 1s22s22p63s23p64s1 Aluminum Cesium Potassium
    12·2 answers
  • . 。 • ゚ 。 .
    10·2 answers
  • AUPs ensure that an organization’s network and internet are not abused. Select 3 options that describe AUPs.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!