1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
3 years ago
8

HELP PLEASE 100 POINTS

Computers and Technology
2 answers:
Mars2501 [29]3 years ago
8 0

Answer:

Explanation:

This is for MS Access:

1. Open the database.

2. Go to the

✔ Backstage

view.

3. Click Info and then__<u>Compact and Repair</u>__

OR

1. Open the database.

2. Click the__<u>Database Tools</u>__ tab.

3. In the Tools group, click ___<u>Compact and Repair Database</u>___

The program then reduces the size of the database.

katrin [286]3 years ago
7 0
Honestly I’m not too sure because I think different models have different steps to use, but I’d guess the second steps... sorry Im not too sure but that is what I think. If you were leaning towards that one then I’d probably go with it.
You might be interested in
A formal log-on procedure is the operating system’s last line of defense against unauthorized access.
Elina [12.6K]
The answer is A. true
7 0
3 years ago
Google, Yahoo, and Microsoft search all use the same Web crawler.
statuscvo [17]
The answer is going to be False they do not use the same Web crawler. 
HOPES THIS HELP:)
4 0
3 years ago
Read 2 more answers
What are possible penalties if a designer is caught breaking copyright laws?
Dominik [7]

Answer:

1 and 4 are the correct answers.

Explanation:

3 0
3 years ago
3. The Central Processing Unit is made of
monitta

Answer:

a

Explanation:

jjwjwjwwjwjwjwjwjwj#k#kwkekee

4 0
2 years ago
The tcp/ip ____ layer commonly uses the transmission control protocol (tcp) to maintain an error-free end-to-end connection.
aleksklad [387]
The answer would be the TCP/IP Application Layer.
6 0
3 years ago
Other questions:
  • If i throw papers in the dryer to help them dry faster could that mess up the dryer?
    5·1 answer
  • Click _______ to view each individual record of a mail merge document.
    5·2 answers
  • Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty de
    9·1 answer
  • Create the following new exceptions: PokemonException, which extends the Exception class. It must have a no-parameter constructo
    13·1 answer
  • / Looks up author of selected books
    15·1 answer
  • Here is a nested loop example that graphically depicts an integer's magnitude by using asterisks, creating what is commonly call
    7·1 answer
  • how do I delete my brainly account, my child signed up for it and nothing has been paid but I do not want the account to exist a
    7·2 answers
  • Select the correct answer.
    10·1 answer
  • Chức năng của hàm MOD(number, divisor)?
    7·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!