1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zanzabum
3 years ago
5

Simone needs to add a query for multiple tables in her database. She is using Access 2016. Which tab should she use to add the q

uery?
Home
External Data
Create
Database Tools
Computers and Technology
1 answer:
pshichka [43]3 years ago
4 0
Database tools should be the answer idrk
You might be interested in
Human-centered technology often recommends _______ao
lidiya [134]

Answer:

Creating objects which people are going to interact with, designers have to be aware of those traits and take them into account in the process. ... Continuing the theme, user-centered design is more focused and concise version of human-centered design with deeper analysis of target audience.The user interacts directly with hardware for the human input and output such as displays, e.g. through a graphical user interface. The user interacts with the computer over this software interface using the given input and output (I/O) hardware.Human-centered design is a creative approach to problem solving and the backbone of our work at IDEO.org. It's a process that starts with the people you're designing for and ends with new solutions that are tailor made to suit their needs. ... Human-centered design consists of three phases.

Explanation:

3 0
3 years ago
Read 2 more answers
List 10 programs or applications on your computer other than any Microsoft office programs
Fofino [41]
Dropbox
Mozilla Firefox, Google Chrome
Gmail, Mozilla Thunderbird
CDburnerXP
Putty, Netflix,
Paint.net, Filezilla
3 0
3 years ago
What is the name of the unique identifier assigned to any personal computer that is connected to the internet?
Stolb23 [73]
There is no truly unique identifier assigned to a PC. Any appearance of a unique ID is merely an illusion. The closest thing there is to a unique identifier is a MAC address, which is actually assigned to a network adapter (Ethernet port, wireless radio, etc.) and is usually unique but can be faked
7 0
3 years ago
Which of the following variable declarations is a correct assignment?
Gwar [14]

Answer:

Option D: double y = 82;

Explanation:

In Java programming, it is acceptable to assign an integer (lower type) to a double type (higher type) variable. By assigning an integer to double type variable using the "=" operator, the integer will be converted to double type implicitly. It is known as the implicit type casting.  

For example, <em>double y = 82</em> will convert integer 82 (integer) to 82.0 (double).

6 0
3 years ago
Do you need special software to create a web page?
Serjik [45]

Answer:

Many websites these days have done it for you, (Wix, Squarespace ect.)

If you want to start from scratch however, then I believe you do, I have only researched these websites which do it for you.

Hope this helped :)

5 0
4 years ago
Read 2 more answers
Other questions:
  • Linda has written a program that works well on various operating systems, but she needs to increase the readability of the progr
    14·1 answer
  • How do you report someone on Brainly?
    6·1 answer
  • The ________ file system supports a maximum file size of 2gb
    12·1 answer
  • During wave motion, the motion of particles to one side of the rest position will be______ the motion to the other side of the r
    12·2 answers
  • You are the manager and two employees are having issues with each other. These issues are affecting their happiness and producti
    11·1 answer
  • Omega Software Inc. is currently running a training program for employees to upgrade their software skills so that they are able
    10·1 answer
  • Active space is important in which type of photograph?
    12·2 answers
  • Why do you think flowers are a popular topic for macro photography? Do you think you’d like to photograph flowers?
    10·1 answer
  • Someone receives and email that appears to be from their bank requesting them to verify account information, this type of attack
    10·1 answer
  • What is an overview of your opinion of Digital Etiquette? Do not look it up bc I will know!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!