1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elan Coil [88]
3 years ago
15

Which security option should be used to ensure the integrity and validity of an Access database?

Computers and Technology
2 answers:
MaRussiya [10]3 years ago
6 0

Answer:

A) digital signature

Explanation:

Fynjy0 [20]3 years ago
3 0

Answer:

The best security which could be used to ensure integrity and validity of Access database is:  

O. database password

Explanation:

Database password is the only option that best guarantee the integrity of an Access database due to the fact that, it limits the number of people who would be able to have access to it. This password is an administrative right given to those who are meant to access it and it is expected to be renewed every few months (probably every 3 months).

<em>Without the password, no other person can be able to login. Also, no two individual can be able to login in same time using same credential login details assigned (that is, in scenario of using the same Username and password)</em>

You might be interested in
Which discipline would be most likely to study and experiment with new technologies like artificial intelligence? software engin
SashulF [63]

Answer:

Information Technology

Explanation:

The discipline that would obtain the most benefit from new technologies such as Artificial Intelligence would be Information Technology. The amount of information that exists on the internet is staggering. Artificial Intelligence works by obtaining as much information as possible, learning from the data gathered, and manipulating the data as needed. This allows Information Technology developers to find patterns in data sets, create virtual assistants, automate tasks, find connections in the data, etc. Therefore, bringing a vast number of benefits from studying and experimenting with such technology.

4 0
3 years ago
Thomas asked his friend for a software suite. His friend had the software suite in his computer and he copied it into a small, r
Misha Larkins [42]

Answer:

The correct answer to the following question will be "Flash memory card".

Explanation:

A flash memory card seems to be a storage (small) medium which stores data or information on fordable or remote devices using non-volatile transistor technology hardware.

  • Most newer offerings include flash storage or memory chips, even though the development of other memory innovations is underway.
  • This would be the storage mechanism from which the configuration tool was replicated by Thomas' friend.
8 0
4 years ago
Objects of the BankAccount class require a name (string) and a social security number (string) be specified (in that order)upon
Maksim231197 [3]

Answer:

import java.util.Scanner;

class BankAccountTest {

       public static void main(String[] args) {

           String name;

           String ssn;

           Scanner in = new Scanner(System.in);

// Receive User input

           System.out.println("Enter Your Name");

           name = in.nextLine();

           System.out.println("Enter Your Social Security Number");

           ssn = in.nextLine();

//Creating an object class BankAccount

           BankAccount newAccount = new BankAccount(name,ssn);

         

       }

   }

Explanation:

Using Java Programming Language

Use Scanner class to read values for name and social security numbers and store in the respective varibles

Make an object of the class BankAccount and supply to values to constructor call

Assume that the class BankAccount exists with the member feilds for name and ssn as below:

<em> public class BankAccount{</em>

<em>   //Class member variables</em>

<em>    private String name;</em>

<em>    private String ssn;</em>

<em>//Constructor</em>

<em>     public BankAccount(String name, String ssn) {</em>

<em>         this.name = name;</em>

<em>         this.ssn = ssn;</em>

<em>     }</em>

<em> }</em>

4 0
3 years ago
The software used to help run the computer hardware is the _____.
Illusion [34]
System software. The system software helps run computer hardware and computer system
6 0
4 years ago
Read 2 more answers
Pennies for Pay Design and write a python program to pass Lab 4-7 with the following modifications: 1.use an outer loop to keep
frez [133]

Answer:

Here you go, change it however you'd like :)

Explanation:

(A nested loop was not needed to fulfill this task)

usr = int(input("How many days would you like to calculate: "))

pen = 0.01

for n in range(1, usr + 1):

   print(f"Day: {n} | Amount: ${pen}")

   pen += pen

6 0
3 years ago
Other questions:
  • Jessica has pinned her favorite applications as icons on her desktop. She always clicks on these icons to work on them. Which us
    5·1 answer
  • Pick the JavaScript code for the following pseudocode. If age &gt;= 65 Then discountRate = 0.10 End If Group of answer choices
    12·1 answer
  • PLEASE HELP!!!!!!!!!!!!!!!!!!!!
    13·1 answer
  • Why hasn’t the World Health Organization declared a global health emergency?
    5·1 answer
  • How to use function in python
    15·1 answer
  • Create a Python dictionary that returns a list of values for each key. The key can be whatever type you want.
    9·1 answer
  • Analyzing the role of elements in audio editing and Video
    7·1 answer
  • Name a network device which would have to be
    9·1 answer
  • Who here has a crush on jk from bts but feels more mature than him
    10·2 answers
  • Periodic Table Question 2:
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!