1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
3 years ago
13

List 3 ways that you can customise a form?

Computers and Technology
1 answer:
kherson [118]3 years ago
7 0

Answer:

In MS Access a form is a database object that is used for the for the display, editing, or entering of data into a relational database or table

A form can be customized in in different ways with MS Access, as outlined by the Information Technology Services document on the University of Illinois Springfield website in including;

1) Adding/adjusting the controls

2) Adjusting the order of the Tabs

3) Using the Tab Controls

Explanation:

You might be interested in
Which statements describe front-end databases? Check all that apply. They can be used to store tables. They can be used to store
Maslowich

Answer:

you don't know you are so much noob bruda

7 1
2 years ago
Suggest three ways in which celebrating an occasion influences food choices?
Basile [38]

Celebrating influences food in more than 1 way
6 0
3 years ago
Read 2 more answers
Which of the following is a technique for storing or copying log events to acentralized logging server?a. Syslogb. Write­once re
Neporo4naja [7]

Answer:A) Syslog

Explanation: Syslog is the log for the messaging in the computing field.It acts as a separator for the different task that is related to messaging. The task usually are storing of message, production of the message through software,analyzing message, reporting it etc.

Other options given in the question such as WORM storage is for the storage technology,UTM is for the management for the threat situation and firewall logging is related with log/tables for firewall.

Thus, the correct option is option (A).

5 0
4 years ago
Which of the following would you classify as workplace violence? A. A co-worker tells you that you’ve got a great body and shoul
aev [14]
I believe it should be C, since it has the most immediate threat to your safety. 
8 0
3 years ago
Read 2 more answers
Select the correct statement(s) regarding PONS. a. only MMF cables can be used, since MMF enables greater data capacities compar
Feliz [49]

Answer:

The correct statement regarding PONS is:

c. PONS systems use passive devices between OLT and ONT

Explanation:

PON means Passive Optical Network. Based on fiber-optic telecommunications technology, PON is used to deliver broadband network access to individual end-customers.  It enables a single fiber from a service provider to maintain an efficient broadband connection for multiple end-users (homes and small businesses).  OLT means Optical Line Terminal, while ONT means Optical Network Terminal.  They provide access to the PON.

7 0
3 years ago
Other questions:
  • Derek, a project manager, needs to create a plan for a software development project. Which approach or document will help him de
    15·1 answer
  • Which of the following should be the first page of a report?
    11·1 answer
  • How you think the new values of your generation will affect economic decisions?
    11·1 answer
  • What is the proper course of action for the following scenario? You want to expand a computer’s capability to play and process v
    8·1 answer
  • The length property of the String object returns
    15·1 answer
  • To have a​ monopoly, barriers to entering the market must be so high that no other firms can enter. Do network externalites crea
    10·1 answer
  • Impact of computer in society, using relevant examples​
    13·1 answer
  • PLZ ANSWER ALL MY QUESTION. Which line of code will display the variable num rounded to the nearest tenth?
    14·1 answer
  • 1. Assume that in an implementation of the RSA cryptosystem one modular squar- ing takes 75% of the time of a modular multiplica
    15·1 answer
  • Consider the following static method.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!