1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vesna_86 [32]
3 years ago
13

Which of the following database object hold data?

Computers and Technology
2 answers:
otez555 [7]3 years ago
6 0

Answer:

B. Tables

Explanation:

In Access, tables, reports, queries and forms are in entering and storing data. Primarily, tables hold data. They are organized as rows and columns. Rows are also known as records while columns are known as fields. Every column contains data that runs vertically along the table. Rows hold strings of information following the same pattern and usually with the same ID number.

Information about specific subjects can all be collectively held in tables.  Obtaining and compiling information is done with queries. Reports are a representation of the data in a printed format. Forms are used to input, view and edit data.

Oksi-84 [34.3K]3 years ago
4 0

Answer:

tables

Explanation:

In Access, all data is stored in tables, which puts tables at the heart of any database. You might already know that tables are organized into vertical columns and horizontal rows. In Access, rows and columns are referred to as records and fields

You might be interested in
Ethics issues are significant in the area of online privacy because laws have not kept pace with the growth of the Internet and
raketka [301]

Answer:

The answer is "True"

Explanation:

In the given statement some information is missing that is "True or false"

Internet security is the scope of the privacy and security of the electronic exchange of data. It's a common term that refers to something like many factors, technologies, and technology used to protect records, contact, and interests, confidential and private.

  • The security of the Internet is recognized as the privacy of the User.
  • It is secure and unique passphrases or two-factor authentication.
7 0
3 years ago
Dennis is driving a car with his family onboard. His children are sitting on the backseat. They have a tablet and want to watch
Mice21 [21]

Answer:

A and D could work

Explanation:

they do basically does the same thing!!

8 0
3 years ago
Adam is so good at playing arcade games that he will win at every game he plays. One fine day as he was walking on the street, h
klio [65]

Answer:

what the answer chaoices

Explanation:

brainlest me please

3 0
3 years ago
1.A panel that , when active , displays options for the selected tool. *
yKpoI14uk [10]
Is there a question or something
7 0
3 years ago
Read 2 more answers
Which statement is NOT true:
RSB [31]

Answer:

The correct answer for the given question is   "Machine languages can be used to write programs that can run on any machine."

Explanation:

The machine language consist of binary digit i. e 0 and 1 .Computer can understand only the machine language .The machine language consist of code that is written in bits so it is used  to express algorithms.When any program is compiled the compiler are converted into machine code so the machine language is produced by the compiler .

Machine language cannot used to write a program that run on any machine.

5 0
3 years ago
Other questions:
  • Write a for loop that iterates from 1 to numbersamples to double any element's value in datasamples that is less than minvalue.
    15·1 answer
  • 7.8.1: Function pass by reference: Transforming coordinates. Define a function CoordTransform() that transforms the function's f
    6·1 answer
  • What does Verizon child allow parents to do? My parents recently got the app and put it on my phone so I was wondering...
    11·1 answer
  • Generally speaking, manufacturing overhead is applied to production by means of a __________ __________ __________, which is com
    11·2 answers
  • Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two character
    8·1 answer
  • I have a question. This question will probably be deleted, but why do moderators keep deleting my answers when they are legitima
    13·1 answer
  • Help with this please anyone
    15·2 answers
  • ITS A VOTE I NEED HELP
    12·1 answer
  • Sum of 18/7 and 13/7 is *​
    14·2 answers
  • Vices for a research paper
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!