1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
14

1. Define Validation Rule

Computers and Technology
1 answer:
RoseWind [281]3 years ago
5 0

Answer:

1. A Validation Rule is a rule given to a field that ensures that the attribute of data entered into the field meets the set criteria of the field before the data can be saved. The question asked by the field is either 'Yes' True or 'No' False, with the required answer being Yes or "True"

2. Compressed hours

Compressed hours is work mode where employees are allowed to do the number of hours to which they are contracted over a less number of working days

3. Microsoft Access

Microsoft Access is designed to automatically save data entered into forms as the user moves between records or when the form being worked on is closed thereby, ensuring  that data loss is prevented even when the form is closed after an edit is made

4. A document editor

A document editor can be used for the creation of new document and editing existing documents of different file types

Explanation:

You might be interested in
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
4 years ago
Wyjaśnij w jaki sposób wykonuje się nitowanie zakładkowe i nakładkowe, oraz wyjaśnij na czym polega pasowanie mieszane.
Ksenya-84 [330]

Answer:

????

Explanation:

i dont speak this language

7 0
3 years ago
What is networking and types of networking?​
ANEK [815]

Answer:networking is searching the internet for information

there are different types of networking scanning the internet for info or reading a website

Explanation:

8 0
3 years ago
What does syntax error mean :-;<br>explain briefly.<br><br>thankyou!
Alex Ar [27]
A syntax error is an error in the syntax of a sequence of characters or tokens that is intended to be written in a particular programming language. For compiled languages, syntax errors are detected at compile-time. A program will not compile until all syntax errors are corrected.
3 0
1 year ago
The ____ is the ranking executive on-site when the crisis or emergency arises, who is authorized to initiate the CM plan.
aleksklad [387]

The answer is the Executive-in charge

The concept of an Executive-in charge came from the military’s chain of command. A chain of command ranges from a supervisor to the top executive of the organization. When a crisis arises, it is possible that one or more of the senior top managers may not be available for consultations because of the travel-intensive positions.






7 0
3 years ago
Read 2 more answers
Other questions:
  • What is the core of an operating system that manages memory and devices, maintains the computer’s clock, starts programs, and as
    7·1 answer
  • The fossilizing process that replaces organic matter with silica or calcite is:
    13·2 answers
  • In a virtual memory system, each process must have its own page table.(True or False?)
    13·1 answer
  • State the rule of 72 for the number of years to halve.
    8·1 answer
  • To prevent users of the application from changing the size of the form. you must set the FormBorderStyle property to ____
    6·1 answer
  • Given the following code:
    8·1 answer
  • Create and configure databases in oracle database management system operation administration
    6·1 answer
  • How many tables are needed to implement an REA data model that has five distinct entity-sets, two many-to-many relationships and
    6·1 answer
  • Significant design efforts, during deliberate planning at combatant commands, produce results as those commands _____. (Select a
    5·1 answer
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!