1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
4 years ago
13

Data validation is the process of a. preventing errors due to invalid data b. preventing errors due to incorrect Transact-SQL sy

ntax c. trapping SQL Server errors so the user doesn’t see the system error message d. using the THROW statement to raise a custom error message
Computers and Technology
1 answer:
professor190 [17]4 years ago
6 0

Answer:

The correct answer to the following question will be "Option A".

Explanation:

Data validation seems to be an important part of every data managing mission unless you are in that area of information or data collection, data processing or planning to deliver the information to stakeholders.

  • Validation could be viewed as something of an integral component of your process instead of as a further move.
  • If your data set isn't correct from the beginning, then your outcomes will undoubtedly not be correct either. That's why the data needs to be checked or tested until it becomes used.

The other three options are not related to the given topic. So Option A is the right answer.

You might be interested in
Hi AllyUbongAbasiEtuk
Ainat [17]

Answer:

not a valid question

Explanation:

4 0
4 years ago
Read 2 more answers
What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote
kramer

Answer:

<em>Source port numbers and Destination </em>

Explanation:

Sockets are also <em>known as the source and destination IP addresses are combined with the  source and destination port numbers.  </em>

The socket is used to define the client's request for server and network.  

Thousands of hosts are communicating with millions of separate servers every day.

5 0
4 years ago
Show how the value 0xabcdef12 would be arranged in memory of a little-endian and a big-endian machine. Assume the data is stored
viva [34]

Answer and Explanation:

For the Big Endian

In a big endian format, the most significant byte is stored at the lowest address and the least significant byte is stored at the highest address. Therefore, the data given is stored as follows:

Address 0 | 1 | 2 | 3

Byte ab | cd | ef | 12

For the Little Endian

In a little endian format, the most significant byte is stored at the highest address (so the least significant byte is stored at the lowest address).

So, the data given would be stored as follows:

Address 0 | 1 | 2 |3

Byte 12 | ef | cd | ab

Hope this Helps!!!

5 0
3 years ago
Design and code a Swing GUI to translate text that is input in english into pig latin. You can assume that the sentence contains
Whitepunk [10]

Answer:

Code given below

Explanation:

import javax.swing.*;

import java.util.*;

import java.awt.*;

import java.awt.event.*;

public class PigLatin extends JFrame

{

private JLabel prompt;

private JTextField input;

private JTextArea output;

private int count;

public PigLatin()

{

super( "Pig Latin Generator" );

prompt = new JLabel( "Enter English phrase:" );

input = new JTextField( 30 );

input.addActionListener(

new ActionListener() {

public void actionPerformed( ActionEvent e )

{

String s = e.getActionCommand().toString();

StringTokenizer tokens = new StringTokenizer( s );

count = tokens.countTokens();

while ( tokens.hasMoreTokens() ) {

count--;

printLatinWord( tokens.nextToken() );

}

}

}

);

output = new JTextArea( 10, 30 );

output.setEditable( false );

Container c = getContentPane();

c.setLayout( new FlowLayout() );

c.add( prompt );

c.add( input );

c.add( output );

setSize( 500, 150 );

show();

}

private void printLatinWord( String token )

{

char letters[] = token.toCharArray();

StringBuffer schweinLatein = new StringBuffer();

schweinLatein.append( letters, 1, letters.length - 1 ) ;

schweinLatein.append( Character.toLowerCase( letters[ 0 ] ) );

schweinLatein.append( "ay" );

output.append( schweinLatein.toString() + " " );

if ( count == 0 )

output.append( "\n" );

}

public static void main( String args[] )

{

PigLatin app = new PigLatin();

app.addWindowListener(

new WindowAdapter() {

public void windowClosing( WindowEvent e )

{

System.exit( 0 );

}

}

);

}

}

5 0
4 years ago
In 2013, the national retailer Target Corporation suffered a major data breach that put the financial information of an estimate
katen-ka-za [31]

Answer:

Security Policies

Explanation:

As computer systems continue to become complex, it makes it hard for co-operates and big businesses to understand the technology that comes with it. Organizations are concerned with how risks are being handled, managed, and reduced. They therefore, expect security policies to reflect how information should be handled. Better security policies shows a company's commitment to protect data and keep the business healthy.

4 0
3 years ago
Other questions:
  • A block style business letter is:
    5·1 answer
  • List the six external parts or "peripherals" of a computer system and identify which are the output and which are the input devi
    6·1 answer
  • Can you call a mobile a computer. It Yes<br>why? If No why​
    7·2 answers
  • Empty parentheses following a function name in a function definition indicate that the function does not require any parameters
    7·1 answer
  • 15. Cinematic tutorials and action-movie camera shots mixed with gameplay and some of the features that have made _____ stand th
    11·1 answer
  • 4.9 Code Practice: Question 4
    5·2 answers
  • A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
    14·1 answer
  • What function would be used if you want to compare all other rows with the first row?
    10·1 answer
  • You cannot then move and resize the control on the form as desired with your mouse TRUE OR FALSE​
    6·2 answers
  • Which ipconfig command switch would a technician use to display detailed information (such as dns servers and mac addresses)?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!