1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
2 years ago
8

(iii) ............ characters can be stored in memo field. (a) 50 (b) 64000 (c) 255 (d) 200 ​

Computers and Technology
1 answer:
Svetlanka [38]2 years ago
7 0

Answer:

(b) 64000

Explanation:

Assuming that the "Memo" being mentioned is a Microsoft Access memo field, it can hold up to 64,000 characters, even in the more recent version of the application where the "Memo" is now know as the "Long Text" field.

According to microsoft.com, "In earlier versions of Access, we used the Memo data type to store large amounts of text... the Long Text field works the same as the Memo field of old... [it] can only display the first 64,000 characters."

<em>Please put "Brainliest" on my answer if it helped you out the most!</em>

<em>(Further Reading) If you're still confused, I suggest you search up the following:</em>

<em>- Microsoft Access Long Text character limit</em>

You might be interested in
Give two differences between EIRGP and RIP.
qaws [65]

Answer and Explanation:

Difference between EIRGP and RIP :

  • RIP stands for routing information protocol whereas EIRGP stands for enhanced IGRP, IGRP is interior gateway routing protocol
  • EGRIP is more based on the link where as RIP is more based on routing
  • There is also references in their working operation.
  • Differences in updates and refreshing.  

7 0
3 years ago
Who knows my aunt better?
fiasKO [112]

Answer:

yes, yes, 30, November 5

6 0
3 years ago
Read 2 more answers
What is a back door?
V125BC [204]

Answer:

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment. Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems.

Explanation:

3 0
3 years ago
Read 2 more answers
What skill would be easiest to learn from a simulation video game?
garik1379 [7]

Answer:

D

Explanation:

the first three you would need hands-on practice to learn.

5 0
3 years ago
Read 2 more answers
ASCII is a common format for the representation of characters in writing code. How many characters can be represented in the sta
andreyandreev [35.5K]

Answer:

A total of 128 characters can be represented in the standard ASCII encoding.

Explanation:

The American Standard Code for Information Interchange (ASCII) was created to make an international standard for encoding the Latin letters. In 1963, ASCII was received so data could be deciphered between PCs; speaking to lower and upper letters, numbers, images, and a few orders.

Since ASCII is encoded using ones and zeros, the base 2 number framework, it uses seven bits. Seven bits permits 2 to the power of 7 = 128 potential blends of digits to encode a character.

ASCII consequently ensured that 128 significant characters could be encoded.

4 0
3 years ago
Other questions:
  • Compare pseudocode and flowcharts for designing computer programs, and discuss the advantages and disadvantages of each.
    13·1 answer
  • 1. ________ is often defined as using illicit (illegal) drugs, or when the drug is alcohol, tobacco, or a legitimate drug (presc
    13·1 answer
  • Using the find and replace tool would be most appropriate when
    6·2 answers
  • Refer to the color wheel to identify the color scheme.
    13·1 answer
  • This program will output a right triangle based on user specified height triangleHeight and symbol triangleChar. (1) The given p
    14·1 answer
  • You work part time at a computer repair store. You are in the process of building a new computer system. The customer wants a mo
    6·1 answer
  • Knowledge management software helps companies preserve the knowledge gained through the use of information so that future users
    15·2 answers
  • What can a scientist do if he repeats and experiment and gets diffrent results?
    5·1 answer
  • Consider a system that contains 32K bytes. Assume we are using byte addressing, that is assume that each byte will need to have
    10·1 answer
  • How many passes will it take to find the five in this list?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!