1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
3 years ago
13

What is a field on a table

Computers and Technology
1 answer:
GaryK [48]3 years ago
4 0

Answer:

Fields in a table store the same category of data in the same data type. For example, if you have a NAME field in a table of customers, the entries for this field are all customer names and are stored as text.

You might be interested in
Can someone help me on drawing ER and Use case diagram on following scenarios. ASAP!!! Please :(
GalinKa [24]

Answer:

The ER Diagram is in the attachment. And I an including the membership details in the use case:

Applicants: Coach will ask for iD.

if the application is not registered, coach sends to registration department.

Applicants registers-->> shows registration ID-->> goes to account section

Submits the fee->> goes to coach again-->>coach asks for fee sjip-->> On yes-->> entrance allowed else-->> sent to account section

Applicants apply for course-->>if prerequisite is met, registration allowed

else-->>registration denied

Note: If registration is allowed the applicant is sent to account section and

Also note:

First check, then registration, then course prerequisite check,then account->entrance

If registered->direct entry.

Explanation:

The answer is self explanatory.

4 0
4 years ago
It is against the law for drivers to use a wireless communication device while driving
Murrr4er [49]

Answer:

The statement is TRUE.

<h3>It is against the law for drivers to use a wireless communication device while driving.</h3>

Explanation:

  • Wireless Communication devices are nowadays one of the biggest causes of road accidents.
  • Using hand held or hands-free devices like mobile phones while driving is restricted strongly in the law. These laws may subject to primary and secondary enforcement by the authority.
  • Different states have passed laws concerning this scenario for different kinds of drivers and different devices accordingly.
  • Talking the scenario as a safety precaution to control road accidents one should try not to use communication devices while driving so that he/she may concentrate on the road properly.

<h2>I hope it will help you!</h2>
7 0
3 years ago
You get an email from your project manager asking you to review the month's sales data. This is an
Marina CMI [18]

Answer:

delegation

Explanation:

8 0
3 years ago
the entity book includes paperback, hardcover, and digital books. the attribute chaptercount applies to both paperback and hardc
erastova [34]

The entity book is available in paperback, hardcover, and digital formats. The attribute chapter count applies to both paperback and hardcover editions, but not to digital editions. Text to speech is a characteristic of digital. The entity type's subtype is digital.

What is entity?

An entity is something that existing as itself, as a subject or as an object, in the present or in the future, concretely or abstractly, physically or not. Abstractions and legal fictions, in particular, are commonly viewed as entities. There is no presumption that an entity is animate or existing in general. Animals, natural features such as mountains, inanimate items such as tables, numbers or sets of symbols written on paper, human inventions such as laws, businesses, and academic fields, and supernatural beings such as gods and spirits are all covered by the phrase.

To learn more about entity
brainly.com/question/13437795

#SPJ4

4 0
2 years ago
A(n) _____ is a type of man-in-the-middle attack where an attacker captures the data that is being transmitted, records it, and
professor190 [17]

Answer:

wireless replay attack

Explanation:

Based on the scenario being described within the question it can be said that the type of attack that is being described is known as a wireless replay attack. Like mentioned in the question this is a network attack where an individual hijacks data in the middle of it being sent in order to copy it before the data reaches the intended recipient. This information can then be used for whatever the attacker intends.

6 0
3 years ago
Read 2 more answers
Other questions:
  • The most popular transmission media option for wired home ethernet networks is ________ cable. fiber-optic power-line unshielded
    15·1 answer
  • Hydropower uses moving water to do work, such as grinding grains in a mill. True False
    7·1 answer
  • As a rising photographer who has recently been recognized for several impactful images, why might you explore copyright protecti
    13·1 answer
  • You are developing open-source software based on existing source code developed by someone else. What is the term for the piece
    9·1 answer
  • What icon is usually used to indicate an attachment feature?
    14·2 answers
  • Question 1 of 30
    13·1 answer
  • Create a basic program that accomplishes the following requirements: Allows the user to input 2 number , a starting number x and
    12·1 answer
  • Do you want my hero academia?<br><br><br><br><br><br> if so, who's your favorite character :&gt;
    5·2 answers
  • PLEASE ANSWER AND HURRY I'LL MARK YOU BRAINLIEST!!<br><br><br>​
    9·1 answer
  • Write an algorithm to find the area of a circle of radius r
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!