1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhannawk [14.2K]
2 years ago
9

Raul needs to ensure that when users enter an order into the tblOrders, the shipping date is at least two days after

Computers and Technology
2 answers:
bagirrra123 [75]2 years ago
7 0

Answer:

input mask

Explanation:

Microsoft Access is a database application used to stored data. It is a relational database with rows and columns of data tables in its database.

Data validation is a tool in Access used to put a constraint on how data is entered in the table. The input mask is a data validation type that forces users to enter data in a specified format for a given field or column.

zaharov [31]2 years ago
3 0

Answer:

A

Explanation:

You might be interested in
Which of these is a type of social engineering attack?
Gnoma [55]

Answer:

phishing

Explanation:

all others are different ways of Hacking.

are you interested in cyber security?

4 0
3 years ago
Find the mistakes in the following code. Not all lines contain mistakes. Each line depends on the lines preceding it. Watch out
Kazeer [188]

Answer:

Explanation:

A null pointer is pointing to nothing, if we can detect if a pointer is null, we can use an "IF" because a null pointer always going to be false, a null pointer even can block an application, because is a result of undefined behavior, it can even cause problems because the compiler can’t tell whether we mean a null pointer or the integer 0, there is a confusion in this kind of pointers.

5 0
3 years ago
You were just hired as an IT Specialist for Smalltown School District. Your first assignment is to review a problem area& in
umka21 [38]

Answer:

Explanation:

There are various questions that you can ask in this scenario, such as

What grading policies are being implemented?

How many student grades are being calculated by the program?

What is the requirements for a student to pass?

All of these questions would allow you to get an idea of how extensive the code may be and its complexity. Once you know this you would look at the code revolving around actually looping through the data and doing the necessary calculations. You can then determine how to manipulate the code and make it much more efficient.

You would also need to know how the student data is being saved, which will help determine if it is the best data structure for saving this type of data or if it can be replaced in order to maintain the data secure while increasing the speed of the program. Mainly since this information needs to be continuously used from the data structure.

3 0
3 years ago
In which type of attack do you get malicious code in links from seemingly reliable websites?
natali 33 [55]

I think it is C. cross-site scripting

6 0
3 years ago
The Nigerian 4-6-9 scam refers to a fraudulent activity whereby individuals claiming to be from a foreign country will promise a
Serhud [2]

Answer:

<em>b. False</em>

<em></em>

Explanation:

<em>The system of fraud is called 4-1-9 scam</em>. And yes, victims are always promised large sum of money to secretly help in moving a large sum of money.

7 0
3 years ago
Other questions:
  • Write an essay on online collaboration, how to do it, the challenges, resolving the challenges, and consider whether the risks a
    12·1 answer
  • Unix/linux are ____ systems, which let many people simultaneously access and share the resources of a server computer.
    13·1 answer
  • The rod and crankshaft convert the up-and-down motion of the piston into
    12·2 answers
  • My computer have black spots and line
    7·2 answers
  • A small company has hired you to take over its IT needs. The company currently has seven on-site employees and 12 remote employe
    12·1 answer
  • An internet connection is required to access which type of software?
    5·1 answer
  • Muultimedia Promo try answer this question and explaining them or give examples of that topic Thanks
    10·1 answer
  • How to get off of supervised user
    7·1 answer
  • Question 1 (1 point)
    5·2 answers
  • Margie has found a stock template to use. She changes a few things about the formatting and then saves the
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!