1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgesh-ka [11]
3 years ago
5

Which type of object is used to organize and store data in Microsoft access 2013

Computers and Technology
2 answers:
grigory [225]3 years ago
6 0

A table is used to organize and store data in Microsoft Access 2013

Explanation

Microsoft Access databases are made up of four simple objects

  • Tables
  • Forms
  • Queries
  • Reports

These objects, when combined, will allow users to do all the things we associate ourselves with when using a database. Data in a database, as we already know, is usually organized and stored for retrieval. This data upon being retrieved is always stored in tables. A table is built upon rows (records) and columns (field). To better explain what a table is, I would want to assume that I own a shop that sells various goods. I have already established a well-organized database that includes my clients’ names and other information. I will include all these information I have about my clients in one table with each client having a unique record and each record will be stored in its own field.

Learn more about query objects in Microsoft Access

brainly.com/question/8675050

#LearnwithBrainly

KATRIN_1 [288]3 years ago
4 0

Answer:

the database

hope this helps

You might be interested in
Select the correct answer.
miv72 [106K]

Answer: Format

Explanation: My head

3 0
3 years ago
Read 2 more answers
Blair is the director of information systems at a marketing firm. She creates a set of guidelines that dictate everything an emp
gizmo_the_mogwai [7]

Answer:

data

Explanation:

Because i said so

4 0
3 years ago
What is one benefit of using electronic sticky notes ?
balu736 [363]
They can be used to just copy/paste e-mailed information without writing down on a paper and losing valuable time. This is one example.
4 0
3 years ago
Read 2 more answers
Element primer a partir del qual es generarà l'energia central solar fotovoltaica
Juliette [100K]
No speak a Spanish ............
7 0
3 years ago
Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget th
never [62]

Answer: key escrow

Explanation:

Using key escrow we are able to recover data if passphrase is forgotten. this technique uses a bypass link to get all the keys to the system only if it is an authorized entry.

7 0
3 years ago
Other questions:
  • Why is it a good idea to view your HTML code in more than one web browser
    13·1 answer
  • Why it is so important for all application builders to always check data received from unknown sources, such as web applications
    5·1 answer
  • apple and adobe are in disagreement about the use of __________ to create apps for the iphone and ipad?
    10·1 answer
  • The first version of the SMTP protocol was defined in RFC 821. The current standard for SMTP is defined in RFC 5321 considering
    11·1 answer
  • How many bits would be needed to count all of the students in class today there is 20 students
    6·1 answer
  • How can multiple items be selected at the same time in aJList?
    8·1 answer
  • Your computer will organize files into
    6·2 answers
  • How do you increase the number of tries by one?
    10·1 answer
  • Differenciate between foreign key and primary key in database.
    8·1 answer
  • Describe the method used by operating systems to differentiate between TCP connections.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!