1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilia_Sergeevich [38]
3 years ago
10

A range check that can be used in Microsoft access to calculate the data collected which is date and time

Computers and Technology
1 answer:
Viktor [21]3 years ago
8 0

A range check is often used when a person works with data consisting of numbers, dates and times, or currency, ensuring that a number is within a specific range.

Explanation:

  • Range checks allow a person to set suitable boundaries.
  • In microsoft (example) : Accept letters (a - z) only : Is Null OR Not Like "*[!a-z]*" : Any character outside the range A to Z is rejected. (Case insensitive.)
  • An example of a range check is checking to see if the value of a 16-bit integer is within the capacity of a 16-bit integer. When a range check is performed, upper and lower boundaries are specified.
  • Range check is a validation check which can be applied to numeric fields. This is done to ensure that only numbers within a certain domain can be entered into a field. Remember that this does not necessarily mean that the data entered will be correct. But it will certainly lie within reasonable limits.
  • A method of validation which checks that data falls between an upper and lower acceptable value.

You might be interested in
What component of a change management program includes final testing that the software functions properly
ValentinkaMS [17]

A component of a change management program which includes final testing that the software functions properly is: C) Release management.

<h3>What is SDLC?</h3>

SDLC is an acronym for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs (applications).

In Computer science, there are seven (7) phases involved in the development of a software program and these include the following;

  • Planning
  • Analysis
  • Design
  • Development (coding)
  • Testing
  • Deployment
  • Maintenance

At the final testing stage, a component of a change management program which ensure that the software functions properly is known as release management.

Read more on software here: brainly.com/question/26324021

#SPJ1

Complete Question:

What component of a change management program includes final testing that the software functions properly?

A) Request management

B) Change management

C) Release management

D) Iteration management

5 0
2 years ago
Which measure should you take for the periodic maintenance of your computer? You need to invest in a for_______________ the peri
Sergio039 [100]
I believe the answer is <span>annual maintenance
</span><span>annual maintenance refers to the system maintenance that being done at a regular time period (most commonly done at least every 6 month)
This is really necessary in order to detect potential virus/malware that would compromise the information within your computer.</span>
3 0
3 years ago
Read 2 more answers
Amy wants to make an exact replica of a specific area in an image. Which tool Amy will use?
ipn [44]

Answer:

Explanation:

.

4 0
3 years ago
For question 1-3, consider the following program: def tryIt(a ,b = 7) return a + b
tino4ka555 [31]

Answer:

1)18

2)4

3)28

Explanation:

1) ans= tryIt(2) *2

        = (2+7)* 2 =18

2) ans= tryIt(-5) *2

        = (-5+7)* 2 =4

3) ans= tryIt(7) *2

        = (7+7)* 2 =28

3 0
3 years ago
Write a function:
Elden [556K]

Answer:

what are the choices

:"

Explanation:

5 0
3 years ago
Other questions:
  • Write an expression that evaluates to true if and only if the value of the integer variable workedOvertime is true.
    7·1 answer
  • This is an electronic method used to send and receive data–voice, text, images, and video.
    13·2 answers
  • All animations on the world wide web are flash animations
    11·2 answers
  • Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
    8·1 answer
  • Among the rights you have as a user of computing resources is the right to​ _______.
    12·2 answers
  • What your computer can do to you?
    14·2 answers
  • What is the cffa act
    5·2 answers
  • KAPWING Video Editing Software allows you to use existing You Tube Videos in your design.
    8·1 answer
  • How would you open the web browser in Linux and still have access to the Linux terminal?
    14·1 answer
  • The technique that allows you to have multiple logical lans operating on the same physical equipment is known as a.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!