1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goshia [24]
3 years ago
11

Which type of join is used to show all the entries in the table containing the primary key regardless of whether that

Computers and Technology
2 answers:
Veronika [31]3 years ago
5 0

Answer:

C)inner or

A)inner for edg 2021

Explanation:

my bad inner might be wrong. Wrong question

kati45 [8]3 years ago
3 0

Which type of join is used to show all the entries in the table containing the primary key regardless of whether that ID has an entry in the second table

left outer join

Which is an organizational unit that is useful for collecting and aggregating similar data on separate forms

Tab pages

Barbara is enabling password protection on a database. Which option is not a secure password

apples

Which file type is used when forwarding a contact as a business card to another user to share their information

VCF

Which statement accurately describes the Clutter feature in Outlook 2016

It analyzes a user’s interaction with particular messages to provide a more focused inbox.

Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create to increase efficiency for these searches

Search folder

Which term refers to the use of expressions to check consistency in relation to other fields in the same record

record validation

Which statement best describes the Tell Me feature in PowerPoint 2016?

It is primarily used to locate options in the menu.

Which option is created specifically for giving a slide presentation in front of an audience and works when the speaker is utilizing multiple monitors or a projector

presenter view

Which type of query should be used to select fields from one or more related tables in a database

simple

Which command group on the Format tab of the SmartArt Tools contextual tab allows a user to change the fill and outline of SmartArt shapes

Shape and style

Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which option should he configure

Show archive folder in folder list

Which option should Gina click to edit the text contained in a text box on a slide in her presentation

text box

Which feature refers to a combination of colors, fonts, and effects that a user can define and apply to slides, slide masters, and slide layouts

custom theme

Which option is used to collaborate with other authors by comparing different versions of the same document

Revisions

An Access table contains rows of table data that contain a complete set of data for a single entity. Which term is used for a row of table data

record

Which sensitivity level is not a default available in Outlook 2016

Company Only

Which option is used to determine whether information that should remain private is included in the final version of a PowerPoint presentation

Document Inspector dialog box

Which option is the easiest way to configure macros in Access 2016

Use the Macro Builder.

Which tab on the ribbon is used to access the global Access 2016 options

Database Tools

Which option in PowerPoint allows users to configure the number of columns and rows manually, using numerical values

Insert Table dialog box

Which feature should be used prior to finalizing a presentation to ensure that audience members with disabilities will be able to understand the message that a presenter is trying to get across

Accessibility Checker

Which tab group is used to modify the background of a chart that is contained in a PowerPoint presentation

Chart styles

Which type of control has its source of data found in a field in a table or query

bound

Shantel is trying to implement the use of data bars on a report that she created. She has selected the Conditional Formatting Rules Manager dialog box. What should she do next

Create a rule.

Lynn would like to insert a hyperlink into an email message without using the ribbon. What is the keyboard shortcut to do so

Control k

Dennis would like to include a video in a presentation. The source of the video is on the internet, but he would like to ensure that the video will play even if an internet connection is not active during the presentation. What should he do

Use the Video from my PC command in the Media group.

Which gallery will allow a user to access a variety of preconfigured formatting styles for images that are added to a PowerPoint presentation

Picture Styles gallery

Hoda is creating a report in Access using the Report Wizard. Which option is not available for adding fields using the wizard

reports

What is a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide, complete with transitions and captions

Photo Album feature

Which type of VBA code is common for grouping statements that perform a certain task

procedure

Kathy would like to export a report that she created into an easy-to-use file format that is supported on multiple platforms and will retain the image quality of the report. Which option should she choose

PDF

Instead of manually moving an item on a slide, which command on the Shape Options tab can be used to determine location on the slide

Size and properties

Janis needs to select all the text in a single bullet point. Which action describes the easiest method to perform this task

Triple-click the text in the bulleted item

You might be interested in
which computer career field enables you to create and design interactive multimedia products and services
dusya [7]
I think its graphic design 
4 0
3 years ago
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
3 years ago
The ____ layer of the osi model performs a series of miscellaneous functions necessary for presenting the data package properly
Darya [45]
The "transport" layer of the OSI model performs a series of miscellaneous functions
Machine function also called miscellaneous functions—influence. positive functions on the machine, such as diverting the spindle rotation and coolant on and off, the path action of the tool, and the program beheading.
7 0
3 years ago
What is the process of publishing a work in Photoshop?
Sunny_sXe [5.5K]

Photoshop is a software program developed by Adobe that allows users to edit graphics. It's used by graphic artists, designers and photographers, among others, and can enhance and manipulate images to improve their appearance. It's an excellent tool that makes photo editing easy and efficient.

Explanation:

  • In the past, it produced creative printing or home publishing programs used for desktop publishing too, but the primary page layout software from Corel is CorelDraw
  • Adobe InDesign is a desktop publishing and typesetting software application produced by Adobe Systems. It can be used to create works such as posters, flyers, brochures, magazines, newspapers, presentations, books and ebooks
  • Adobe InDesign is a standard piece of publishing software, and is commonly used by professional typesetters to design the inside pages of books.
  • Select an image, and then choose File > File Info
  • Use the File Info dialog box to view or edit an image's metadata. This dialog box displays quite a bit of information. Many of the settings in it are important in the metadata.
  • Metadata is a set of standardized information about a file, such as author name, resolution, color space, copyright, and keywords applied to it.
8 0
3 years ago
PLS HURRY!!<br> Look at the image below
Crank

The output will be 10.

The while loop runs until numb is equal to or less than 13.

25 - 5 = 20

20 - 5 = 15

15 - 5 = 10, which is less than 13 so the loop stops and 10 is printed to the screen.  

4 0
3 years ago
Other questions:
  • If a class has member variables that are pointers, you must ensure that you implement ____.
    6·1 answer
  • Create a Python program as described below and save it in a file named bool. You should use IDLE or similar environment to creat
    15·1 answer
  • In the INSERT statement that follows, assume that all of the table and column names are spelled correctly, that none of the colu
    9·1 answer
  • You are given a data set with information from 1,000 high school students (of which the following is a part of the data) and ask
    6·1 answer
  • Select all that apply.
    8·2 answers
  • Which tab provides commands for the most commonly used elements in Word software?
    15·1 answer
  • sara has just started using the Internet. She would like to be more efficient . In 3-4, give sara some advice about how to be mo
    5·1 answer
  • C++
    11·2 answers
  • What type of culture is computer hardware?
    6·2 answers
  • To enforce the concept of separating class definition from its function implementations, where should the function implementatio
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!