1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NikAS [45]
2 years ago
9

What are the steps to creating a blank database? Use the drop-down menus to complete them.

Computers and Technology
1 answer:
Alenkasestr [34]2 years ago
5 0

Answer:

What are the steps to creating a blank database? Use the drop-down menus to complete them.

click the file tab, and click new

Under the available Templates category, click Blank Database.

Specify a name and location for the database.

Click create.

Explanation:

Just did it on Edge :)

You might be interested in
What are the two components that make up the chipset?
svet-max [94.6K]
Northbridge and Southbridge components.
6 0
3 years ago
A computer _________________ is a text file that a computer can understand
Gekata [30.6K]

Answer:

A computer ___Task__ is a text file that a computer can understand

6 0
2 years ago
Which of the following subject lines would be best to use when applying for a position in a high school teacher
mel-nik [20]

Answer:

option d

Explanation:

Subject line should be short but descriptive. Whenever a person reads a subject, he/she should know what the application is all about. In the question, the application is all about applying for a school teacher so subject must contain words for teacher.

7 0
3 years ago
Create a class called Book with the following properties using appropriate data types: Title, Author, numberOfPages, Create a se
tamaranim1 [39]

Answer:

I don't know the answer sorry

7 0
3 years ago
Filtering of packets as they leave the network destined for the internet is called ____________ .
e-lub [12.9K]
<span>Filtering of packets as they leave the network destined for the internet is called packet filtering. This firewall technique is also known as static filtering, and it is mainly used to control network access through the process of monitoring both outgoing and incoming packets. Along with monitoring, it functions to allow the packets to pass or halt which takes place based on the source of Internet Protocol.</span>
6 0
3 years ago
Other questions:
  • Which type of device log contains the most beneficial security data?
    7·1 answer
  • What tool listed below will be the most useful for developing presentation content?
    10·2 answers
  • Write a MARIE program to allow the user to input 8 integers (positive, negative, or zero) and then find the smallest and the lar
    15·1 answer
  • If you glare and grit your teeth while telling your friend that you're not frustrated, your nonverbal communication is _________
    6·1 answer
  • Describe one type of technology that is useful in producing images from space.
    9·1 answer
  • Define a function below, sum_numeric_vals, which takes a single dictionary as a parameter. The dictionary has only strings for k
    12·1 answer
  • The program used to create the file where you want to insert the object is called the ____.
    12·1 answer
  • Which of the following operations are considered to be crucial tasks that should be performed before installing server roles and
    14·1 answer
  • Examples of domain names and usernames<br><br><br><br>​
    11·1 answer
  • When calling a function with arguments that should be modified, the __________ of those arguments are passed.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!