1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhannawk [14.2K]
3 years ago
9

Raul needs to ensure that when users enter an order into the tblOrders, the shipping date is at least two days after

Computers and Technology
2 answers:
bagirrra123 [75]3 years ago
7 0

Answer:

input mask

Explanation:

Microsoft Access is a database application used to stored data. It is a relational database with rows and columns of data tables in its database.

Data validation is a tool in Access used to put a constraint on how data is entered in the table. The input mask is a data validation type that forces users to enter data in a specified format for a given field or column.

zaharov [31]3 years ago
3 0

Answer:

A

Explanation:

You might be interested in
2) List three (3) negative impact of Technology on society
Nataly [62]

Answer:

1. social media and mobile devices may lead to psychological.

2. They may contribute to more serious health conditions such as depression.

3. The overuse of technology may have a more significant impact on developing children and teenagers.

Explanation:

may this help you have a good day

5 0
3 years ago
The Danger zone around a robot is?
mojhsa [17]

maybe a EMP. tell me if im right

3 0
3 years ago
Read 2 more answers
Any two differences between third and fourth generation of computer
Setler [38]

Answer:

Third generation computer use integrated circuit(IC) and it was fast and reliable.

Forth generation computer micro computer were introduced and they were highly reliable and fast.

5 0
2 years ago
Read 2 more answers
One method of encoding messages is known as the "expanding square code". this method encodes message by placing the character of
mars1129 [50]
Wow!! that is ALOT of info,I dont think i could help with this one Umders 699 maybe someone else can sorry that i couldn`t help :)
4 0
3 years ago
In your opinion, why did Proponents<br>of IPs used IPV6 instead of IPv5​
frutty [35]

Answer:

The following where many reasons why IPv6 was used instead of IPv5 which are the limitation of it's 32 bit address, IPv5 began or used with a different name called Internet streaming, IPv6 provides unlimited addressing, because it comprises of 128 bit.

Explanation:

Solution:

The following reasons why Proponents  of IPs used IPV6 instead of IPv5​ is stated as follows:

  • Due to its limited 32 bit addressing
  • IPv6 offers almost unlimited addressing because of its 128-bit addressing
  • IPv5 started under a different name which is internet stream(ST)
  • ST(Internet streaming) was developed for streaming video and voice
  • ST was developed by Apple, NeXT, and Sun Microsystems
  • ST was effective on specific frequency to carry out communication
5 0
3 years ago
Other questions:
  • 3) Write a program named Full_XmasTree using a nested for loop that will generate the exact output. This program MUST use (ONLY)
    6·1 answer
  • 2. a. Write pseudocode for a divide-and-conquer algorithm for finding valuesof both the largest and smallest elements in an arra
    11·1 answer
  • Show a single view of an object, but show it in a way that makes it look 3-D, as your eye would see it.
    10·1 answer
  • Karen thinks she should go out with Blane, an unattractive, social misfit, because “If I don’t go out with him, people will thin
    7·1 answer
  • Structured walk-throughs take place throughout the SDLC and are called _____ reviews, depending on the phase in which they occur
    9·1 answer
  • In Java, it is possible to create an infinite loop out of while and do loops, but not for-loops. true or false
    11·1 answer
  • Which of the following is true of how packets are sent through the Internet?
    11·2 answers
  • The show ip dhcp binding command displays _____. (Points : 5) the MAC table cache information
    7·1 answer
  • A user purchased a new smart home device with embedded software and connected the device to a home network. The user then regist
    5·1 answer
  • Select the correct answer..
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!