1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Simora [160]
4 years ago
14

A ___________ is used when an extra digit is added to a coded field to make sure it the entered data is correct (like social sec

urity numbers).
Computers and Technology
1 answer:
Mamont248 [21]4 years ago
7 0
A Check digit check is used when an extra digit is added to a coded field to make sure it the entered data is correct (like social security numbers).
You might be interested in
The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary. manipulation
Ira Lisetskai [31]

Answer:

definition

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Hence, the data definition component of a database management system (DBMS) is used to create and maintain the data dictionary.

6 0
3 years ago
The range of Cell that go across the spread sheet and are identified by numbers is called​
Zanzabum

Cells are identified by the Cell Name (or Reference, which is found by combining the Column Letter with the Row Number. For example the cell in Column "C" in Row "3" would be cell C3. Cells may contain Labels, Numbers, Formulas or Functions. Cell Name: By default, the name of a cell is the cell reference.

Hope this helps

7 0
2 years ago
Katherine wants to open a bank account that allowed her to perform frequent transactions without being charged a penalty and she
Pavlova-9 [17]

Answer:

C

Explanation:

8 0
3 years ago
If you inadvertently rename a file that is associated with certain apps, the apps may not be able to find the file and may not r
ad-work [718]
No.... This wont happen.... The computer only renames the file and dont let those apps go....in easy words We can say that the comp tells the apps to stay here...
7 0
3 years ago
Read 2 more answers
Discuss two things you’ve learned about computers
olga55 [171]

Answer:

Time management,

Refreshment,proper input, Need of energy,prioritization.

7 0
3 years ago
Other questions:
  • As you move the click and type pointer around the document, the icon changes to represent ____________________ that will be appl
    10·2 answers
  • The benefits associated with software reuse are lower cost, better quality,
    9·1 answer
  • You want to centrally back up the files users store in the Documents folder in their user profiles, but you don’t want users to
    7·1 answer
  • Write a program that reads in your question #2 Python source code file and counts the occurrence of each keyword in the file. Yo
    11·1 answer
  • When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was runn
    9·1 answer
  • Let A and B be two stations attempting to transmit on an Ethernet. Each has a steady queue of frames ready to send; A’s frames w
    7·1 answer
  • Typing which capitals and exclamation points in an email is an example of
    14·1 answer
  • Who requests services and who facilitates services to a client.​
    6·1 answer
  • Consider the following method substringFound, which is intended to return true if a substring, key, is located at a specific ind
    14·1 answer
  • Your son is complaining that his smartphone is broken. He tells you that he cannot connect to the internet, nor can he make or r
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!