1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
5

7-9 validation rule in a field will​

Computers and Technology
1 answer:
Yuki888 [10]3 years ago
6 0

Answer:

Validation rule in a field will restrict the input from user into a field or table

Explanation:

Validation is used in database to ensure that the correct data type is entered in the fields. When validation is applied to a field, a message is displayed to the user if he enters the data of wrong datatype.

Hence,

Validation rule in a field will restrict the input from user into a field or table

You might be interested in
What is the name given to software that decodes information from a digital file so that a media player can display the file? har
KiRa [710]

Answer:

plug-in

Explanation:

A Plug-in is a software that provides additional functionalities to existing programs. The need for them stems from the fact that users might want additional features or functions that were not available in the original program. Digital audio, video, and web browsers use plug-ins to update the already existing programs or to display audio/video through a media file. Plug-ins save the users of the stress of having to wait till a new product with the functionality that they want is produced.

6 0
3 years ago
If you were teaching a fellow student to use software for the first time and the software had many built-in hotkeys, would you f
Liula [17]

Answer:

Hotkey commands

Explanation:

It would be easier and more efficient in the long run to use hotkeys.

5 0
4 years ago
How do I turn on your asus chromebook flip?
galben [10]
I believe the charger has to be connected for it to turn on.
3 0
3 years ago
Given the list of customer segments below please create a new list of the names of the segments only using(a) a for loop(b) a li
Alchen [17]

Answer:

new_segment = [ ]

for segment in segments:

   new_segment.append({'name': segment, 'average_spend': money})

print( new_segment)

Using list comprehension:

new_segment =[{'name': segment, 'average_spend': money}  for segment in segments]

Using map():

def listing(a):

   contain =  {'name': segment, 'average_spend': money}

   return contain

new_segment = [ ]

new_segment.append(map( listing, segment))

print(list(new_segment)

Explanation:

The python codes above create a list of dictionaries in all instances using for loop, for loop in list comprehension and the map function which collect two arguments .

7 0
3 years ago
Match the part of the browser window to the correct description.
hodyreva [135]

Answer:

1. Tabs: allows you to drag the window to a new location

Explanation: Tab is the key that is used to switch between different windows or websites that are opened at a time. This can be done by pressing Ctrl+Tab

2. Status Bar: displays whether the Web page is secure or not

Explanation: Status bar is used to show the status or information related to that page. Like Information related safety precaution.

3. Title Bar: allows you to quickly move between different Web sites

Explanation: Title bar consist of the name of different websites that are open at particular time. This shows at the top of the browser. We can quickly move on different websites using title of website.

4. Bookmarks: save Web addresses so you can return to them quickly

Explanation: Bookmarks are the pages that we save in bookmark menu, to re-open the page whenever its needed.

4 0
3 years ago
Other questions:
  • Jenny wants to create a résumé after a two-years gap. What should she consider?
    11·2 answers
  • What operating system type uses icons to represent programs
    9·2 answers
  • A text file has been transferred from a Windows system to a Unix system, leaving it with the wrong line termination. This mistak
    15·1 answer
  • How do the companies gather data to determine common passwords?
    13·1 answer
  • Alice and Bob decide to communicate using NTRUEncrypt with parameters (N, p, q) = (7, 3, 29). Alice’s public key is h(x) = 3 + 1
    15·1 answer
  • Hello pls answer<br><br><br>what is the use of loop in java​
    5·1 answer
  • I NEED THIS ASAP PLS
    12·1 answer
  • Answer any one: write a computer program:which you know.​
    6·1 answer
  • Define the terms network, LAN, WAN, and Internet.
    11·1 answer
  • The __Option carries out the commands one at a time. O Step-by-Step Run Command Open Command​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!