1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
14

1. Define Validation Rule

Computers and Technology
1 answer:
RoseWind [281]3 years ago
5 0

Answer:

1. A Validation Rule is a rule given to a field that ensures that the attribute of data entered into the field meets the set criteria of the field before the data can be saved. The question asked by the field is either 'Yes' True or 'No' False, with the required answer being Yes or "True"

2. Compressed hours

Compressed hours is work mode where employees are allowed to do the number of hours to which they are contracted over a less number of working days

3. Microsoft Access

Microsoft Access is designed to automatically save data entered into forms as the user moves between records or when the form being worked on is closed thereby, ensuring  that data loss is prevented even when the form is closed after an edit is made

4. A document editor

A document editor can be used for the creation of new document and editing existing documents of different file types

Explanation:

You might be interested in
Kelly is evaluating the following image. Which of the statements that she makes about the photograph is true?
Stells [14]

Photo not included

Plz add photo

7 0
3 years ago
Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
zalisa [80]

Answer:

router.

Explanation:

Router is the main connection for a house network to the Internet, the firewall function is combined to the router. Every house network must have a firewall to protect their privacy.

The router provides the hardware firewall while the windows provides the software firewall.So the answer to this question is router.

5 0
3 years ago
You are the IT security manager for a retail merchant organization that is just going online with an e-commerce website. You are
lions [1.4K]

Answer:

Input validation, Allowing script input, and Escaping metacharacters

Explanation:

A programmer can implement the most effective way to prevent XSS by validating input, coding defensively, escaping metacharacters, and rejecting all script-like input.

4 0
3 years ago
How do you change the top and bottom margins of an entire document
Elodia [21]
Deep depending on the document editor, you should be able to just click either the top or bottom margin to edit!
6 0
4 years ago
During the maintenance phase of the systems development life cycle (SDLC), hardware and software components have been _____.
Sedbober [7]

Answer:

developed and tested.

Explanation:

5 0
2 years ago
Other questions:
  • An auxiliary view is always projected from the view that shows the inclined surface as a(n) _____.
    14·1 answer
  • Fredrick wants to revise an employee policy. If he wants to inform all of the employees of the change, what type of document wil
    10·2 answers
  • What are the two types of computers
    15·2 answers
  • Briefly define "address space" and discuss its major tradeoffs (advantages/costs). What problem is it addressing?
    10·1 answer
  • Consider the following code which deletes all the nodes in a linked list. void doublyLinkedList::destroy() { nodeType *temp; //p
    14·1 answer
  • The site is not allowing me to purchase the subscription. Please help?
    12·1 answer
  • I need help ASAP Asap asap!!!
    11·1 answer
  • A student is curious about how a Web site appears on his computer screen. On a piece of paper,
    8·1 answer
  • JKJKNJJNJJJLKN;K;L;LHNL;BJ
    5·2 answers
  • Help with Java, please!
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!