1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zinaida [17]
3 years ago
11

In access, the columns in a table are called?

Computers and Technology
1 answer:
liubo4ka [24]3 years ago
6 0
All tables are composed of horizontal rows and vertical columns, with small rectangles called cells in the places where rows and columns intersect. In Access, rows and columns are referred to as records and fields. A field is a way of organizing information by type.
You might be interested in
Darren wants to substitute every occurence of the word bulky in his spreadsheet with the word strong. which of these options sho
Kaylis [27]
If you wanted to remove all the occurrences of bulky and replace them with the word strong. You would use replace all.
6 0
3 years ago
A news report says that company XYZ network was attacked by outsiders, who apparently sent a lot of spoofed ARP requests/respons
GaryK [48]

Answer:

False

Explanation:

Mac address a physical addresses of digital devices, hard-coded to the communication interface as a unique identifier.

ARP or address resolution protocol is a layer 2 protocol used by switches to determine the MAC address of host devices by send a broadcast message through all ports in the switch.

ARP spoofing attack is done within a network, whereby an attacker changes the Mac address to receive data meant for another target host. With this, a remote access to the switch is used to establish an ARP cache poisoning attack.

4 0
3 years ago
Ou are a web page designer and you set up a page with five different links. a user of the page can click on one of the links or
sertanlavr [38]

There are 6 possible outcomes and they are :

S={link1,link2,link3,link4,link5,leave}

this is the sample space for the outcome of a visitor to your webpage.

8 0
3 years ago
Each object that is created from a class is called a(n) ____________ of the class.
gladu [14]
Instance





-------------------------
7 0
3 years ago
Read 2 more answers
What does a compiler do, and why is it necessary when using higher-level languages?
UkoKoshka [18]

Answer:

A compiler converts human readable instructions into machine code (machine readable instructions). Without it, a computer will not be able to understand the code that was written and execute it. Since higher programmer languages are easier for humans to read and write and effective compiler is needed. This has to do with how the compiler does much of the work when it comes to programming.

A great example is a drag and drop programming language. The compiler does all the work in the background before the machine can actually execute the code, but the language itself is incredibly easy to read and write by human standards. Without the compiler, it would be impossible for the machine to execute any code.

Explanation:

High Level programming languages like Python has a system that turns our easy to read human code into something the computer can actually read. Python for example, doesn't compile the code as it was design to do it as it runs.

Low level programming languages like Objective C uses a compiler to change the human readable code to machine code. You can tell a compiler was used when there is a 2nd file, one that can't be read by humans. This is the compiled code that the machine actually runs.

8 0
4 years ago
Other questions:
  • Any method of determining whether an event or object is older or younger than others
    13·2 answers
  • How do you get free Wifi on your phone without paying
    6·1 answer
  • A bug collector collects bugs every day for seven days. Write a program in Python that finds the highest number of bugs collecte
    11·1 answer
  • What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior g
    11·1 answer
  • 1. Explain the difference between a web browser and a search engine. (2 points)
    8·1 answer
  • What is Identity Theft?
    8·1 answer
  • A popular photo editing application provides customers with the option of accessing a web based version through a monthly subscr
    11·1 answer
  • Write a program that accepts three decimal numbers as input and outputs their sum.
    10·1 answer
  • Which of the following statements about content-based filtering is TRUE?
    9·1 answer
  • You want to purchase a computer, and the salesperson refers to separate pricing for a system unit and for the software applicati
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!