Select the correct answer.
Dina created a database related to essential oils and their uses. For every oil, she wants to enter a unique code number. Which data type would be suitable for entering this data?

A.
Boolean
B.
autonumber
C.
BLOb
D.
memo
E.
null

Answers

Answer 1

Answer:

Autonumber

This is because Autonumber is the only option out of the four that accepts random unique code numbers

Feel free to mark as brainliest :D


Related Questions

defination of Wi-Fi plz​

Answers

Answer:

A facility allowing computers,smartphones and other devices to connect to the internet or communicate with one another wirelessly.

what is file management?can please help me​

Answers

is the process of administering a system that correctly handles digital data. also i think it improves the overall function of a business workflow. but this could be totally wrong.
File Management includes common operations performed on files or groups of files, include creating, opening, renaming, moving or copying, deleting and searching for files, as well as modifying file attributes, properties and file permissions


What is required when opening a checking account?
A. A credit card
B. A salary
C. A copy of your last paycheck
D. An initial deposit

Answers

Answer:

it's D

Explanation: i had this question before and i got it right :)

Answer:

D. An initial deposit

Explanation: Hope this helps :)

Running the Disk Cleanup utility is a quick way to ________. Group of answer choices defrag your hard drive remove spyware programs clear out temporary Internet files uninstall unwanted apps

Answers

Answer:

Clear out any garbage file on the drive

Explanation:

Running the Disk Cleanup utility is a quick way to clear out temporary Internet files. Therefore option C is correct.

Running the Disk Cleanup utility is a quick and efficient way to clear out temporary files and unnecessary data from your computer's hard drive.

These files can accumulate over time from web browsing, software installations, and system updates, occupying valuable disk space and potentially slowing down your system.

The Disk Cleanup tool identifies and deletes temporary internet files, cached data, downloaded program files, and other unnecessary files, freeing up space and improving system performance.

However, it is important to note that Disk Cleanup does not defragment your hard drive (A), remove spyware programs (B), or uninstall unwanted apps (D), as these tasks require different tools or procedures.

Therefore option C is correct.

Know more about Disk Cleanup:

https://brainly.com/question/31937611

#SPJ6

What is the error in the following line: (1)

age=int(input("Enter your age:")

Answers

Answer:

14

Explanation:

Lots of data can be transferred in short time, when we have,
a.High latency
b.Higher bandwidth
c.Lagging
d. Lower bandwidth

Answers

Answer: B. Higher Bandwidth

Thank you lord lord please thank you

(a) How many copies of the book titled "The Lost Tribe" are owned by the library branch whose name is "Sharpstown"? (b) How many copies of the book titled "The Lost Tribe" are owned by each library branch? (c) Retrieve the names of all borrowers who do not have any books checked out. (d) For each book that is loaned out from the Sharpstown branch and whose DueDate is prior to "September 1, 2018", retrieve the book title, the borrower’s name, and the borrower’s address. (e) For each book authored (or coauthored) by Stephen King, retrieve the title and the number of copies owned by the library branch whose name is "Central". (f) Retrieve all book titles that are available in "Sharpstown" branch but not in "Morristown" branch. (g) Retrieve book titles that are available in all library branches in the database.

Answers

Answer:

a) SELECT No_of_copies

FROM ((book JOIN book_copies) JOIN library_branch)

WHERE title = 'The Lost Tribe' AND branchname = 'Sharpstown';

b) SELECT branchname, No_of_copies

FROM ((book JOIN book_copies) JOIN library_branch)

WHERE title = 'The Lost Tribe'

GROUP BY branchname;

c) SELECT Name

FROM borrowers B

WHERE cardno NOT IN ( SELECT cardno FROM book_loan)

d) SELECT title, name, B.address

FROM (((book JOIN book_loan) JOIN library_branch) JOIN borrowers B)

WHERE duedate = '09/01/2018' AND branchname = 'Sharpstown';

e) SELECT title, No_of_copies

FROM (((book JOIN book_authors) JOIN book_copies) JOIN library_branch)

WHERE authorname = 'Stephen King' AND branchname = 'Central';

g) SELECT DISTINCT title

FROM ((book JOIN book_copies) JOIN library_branch)

Explanation:

The SQL statements query's a book store database of seven relations using joins and subqueries to return results.

Write an expression that evaluates to true if the value of the int variable widthOfBox is not divisible by the value of the int variable widthOfBook. Assume that widthOfBook is not zero. ("Not divisible" means has a remainder.)

Answers

Answer:

The expression is:

if widthOfBox % widthOfBook != 0

Explanation:

Given

Variables:

(1) widthOfBox and

(2) widthOfBook

Required

Statement that checks if (1) is divisible by (2)

To do this, we make use of the modulo operator. This checks if (1) is divisible by 2

If the result of the operation is 0, then (1) can be divided by (2)

Else, (1) can not be divided by (2)

From the question, we need the statement to be true if the numbers are not divisible.

So, we make use of the not equal to operator alongside the modulo operator

write a program to calculate the area of rectangle​

Answers

Answer:

program by LET statement

Explanation:

CLS

REM to find the area of rectangle

LET L=40

LET B=20

LET AOR=L*B

PRINT "AOR=";AOR

END

                                                                                         Press F5

output

AOR=800

compare shopping centre and open -air market​

Answers

Answer:

The similarities between a shopping center and an open-air market are;

1. Goods are bought and sold in both a shopping center and an open-air market

2. The stores within the location have different owners

3. Buyers can move between stores for transactions

The differences between a shopping center and an open-air market are;

1) The shopping center is usually roofed, while an open-air market is usually located outdoors

2) The stores in a shopping center more often have a checkout point, while stores in an open-air market rarely make use of a checkout

3) Items found with a defect after purchase can usually be returned for a replacement in a shopping center, while it is necessary to check an item well when buying from an open-air market as returning such items is usually difficult

Explanation:

A shopping center is a complex or area that have several shop groups built together which can all be located under a roof

Professional offices, restaurants, banks, theaters, and pharmacy's  can also be located in a shopping center

Open-air market is a place in the public used for the sale of food and merchandise

[Plato] In A Soccer Game, You Want To Finish The First Half In Five Minutes. So, You Set The Match Duration To Ten Minutes. This Is An Example Of What Kind
Of Time Element?

A)Altered
B)Variable
C)Authentic
D)Player Adjusted

Answers

Answer: D. Player Adjusted

Explanation: The reason why the answer is player adjusted is because a player in the game is changing the time to 10 minutes.

Have a nice day!

Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest

Answers

Answer:

Motion sensor.

Explanation:

I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor

You are an administrator with 550 devices to enroll into Intune. You choose to bulk enroll them. Which other software will you need to build the package necessary to bulk enroll the devices via USB or network location

Answers

Answer: Windows Configuration Designer (WCD)

Explanation:

The other software that will be needed to build the package which is vital in bulk enroll the devices through USB or network location is Windows Configuration Designer (WCD).

Windows Configuration Designer typically allows the configuration of several aspects of Windows devices such as Active Directory, Connect to WiFi, Device name, and install applications.

Roger wants to give semantic meaning to the contact information, which is at the bottom of the web page. To do this he will use a footer element as a ______ of the contact information.

Answers

Answer:

Parent

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of a HTML document contains the contents or informations that a web page displays.

In this scenario, Roger wants to give semantic meaning (an element conveying informations about the type of content contained within an opening and closing tag) to a contact information placed at the bottom of a webpage. Thus, in order to do this, he should use a footer element as a parent of the contact information and as such all instance variables that have been used or declared in the footer class (superclass) would be present in its contact information (subclass object).

I got a question in computer science I don't understand, can someone please help.​

Answers

Answer:

Hi, this program allows you to calculate a sphere’s area and volume depending on the radius of your choosing.

Please give brainliest, means alot!

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this

Answers

Answer:

The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Explanation:

Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?

A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.

B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access

C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.

D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.

The explanation of the answer is now provided as follows:

Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.

The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.

By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

what is peopleware?
need help​

Answers

Answer:

Peopleware is a term used to refer to one of the three core aspects of computer technology, the other two being hardware and software.

What type of communication takes place between two individuals or parties and involves the use of encryption so that only the desired individuals have access to what is being said or heard

Answers

Answer:

private

Explanation:

What is the definition of WLAN​

Answers

Explanation:

A wireless LAN is a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building.

WLAN stands for wireless local area network. It is a wireless connection that connects two or more devices in LAN. WLAN uses access points and routers to make a connection between devices. Wi-Fi is an example of WLAN where devices are connected wirelessly within a limited range.

stay safe healthy and happy.

What is one similarity between compiled and interpreted programming languages? (5 points)

Both compiled and interpreted languages are translated one line of code at a time before moving to the next line.

Both compiled and interpreted languages can be shared with others while keeping the source code private.

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

There are no similarities between compiled and interpreted programming languages.

Answers

Answer:

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

Explanation:

The one similarity between compiled and interpreted languages is that they are both high-level languages.

A high-level language is a computer language written in easy to understand human language which is then converted to machine code for the computer to understand.  

A high-level language can either be interpreted or compiled.

An interpreted is a language in which the code is translated line by line before execution while a compiled language is one in which the source code is converted directly into machine language before execution.

So, the similarity between both languages is that they are high level languages and translate code for a computer to understand.

…….. and ……...are called binary digits. (Computer Science)

Answers

Answer:

Explanation:

0 and 1 are called binary digits.

here is your answer..

By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:

Answers

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

What is a named bit of programming instructions?

Answers

Answer:

Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

PLEASE HELP !!!! 40 POINTS BUT HELP

Write a python program to build a simple BMI calculator, where your program asks the user to input the height and the weight of the user then displays the BMI and statement stating the overall health of each user . All the data should be in variables , and no functions should be used.
The program should contain the following:
Welcome message- Display your full name, project name and give a small description on your project (definition of the BMI) [2 marks]
Variables :
height variable , input by the user [2 marks]
Weight variable , input by the user [2 marks]
Use a proper data type change function , int() or float() [2 marks]
Calculate the BMI by using the input variables of the height and the weight . [4 marks]
Display the BMI with statement based on the result of the BMI , refer to the below table [6 marks]
Critical thinking :
After running the code, don't stop the program and ask the user for a new input for a new calculation .(use loop , Break )
EXAMPLE :
Do you want to make a new calculation ? if no end the program , if yes start the code again .[2 marks]

Answers

Answer:

So in a way it is about a python calculation

When you assign a value of one data type to a variable of another data type, Visual Basic attempts to perform ________ type conversion. Group of answer choices

Answers

Answer: implicit

Explanation:

When a value of one data type is assigned to a variable of another data type, then Visual Basic attempts to perform an implicit type conversion.

Implicit type conversion, simply refers to when one data type is converted automatically by Python to another data type. It should be noted that no user involvement is needed.

A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?

Answers

Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”

1.Choose the best answer.:
 a) Broadly, computers are of ................ purpose and ................ purpose
     (i) specific, general     (ii) specific, broad    (iii) precise, broad     (iv) None of them
 b) .................. computers works on continuous signals
 (i) Analog     (ii) Digital    (iii) PS/2        (iv) None of them
 c) ................ computers are the largest and most expensive digital computers.
 (i) Mainframe        (ii) Mini    (iii) Super        (iv) Apple 
d) .................. is the example of mainframe computer.
 (i) CYBER 205    (ii) IBM 3081        (iii) VAX        (iv) IBM 9375
 e) Macintosh is the OS used in .................. computer.
 (i) IBM        (ii) mainframe        (iii) super    (iv) apple
 f) .............. was mainframe computer brought first time to process census data in Nepal.
 i) IBM 1400        ii) IBM1401        iii) IBM1402 
g) ……… computer are used in hospital for Ultra Sound.
 i) Analog    ii) Digital        iii)Laptop    iv) Hybrid 
h) Nowadays, most powerful super commuter is Sunway taihulight from .......................
 i) India    ii) Germany         iii) China    iv) Nepal

Answers

Answer:

specific, generaldigitalminiCYBER 205IBMIBM1401digitalGermany

what is processing for a computer?​

Answers

Answer:

is an action or series of actions that a microprocessor, also known as a central processing unit (CPU), in a computer performs when it receives information.

What are some signs that could help you determine that a date and time was inserted as a special object instead of
typed as normal text? Check all that apply.

Answers

Answer:

i) It is difficult to put the mouse pointer's insertion point in the text

ii) A gray border appear around the time and date when you point to it

Explanation:

When the date and time is pointed to or hovered using the mouse pointer, we have, that the background of the text changes to a grey border around the text when the date and time is inserted as a special object using the insert date and time button on the insert menu in the word processing application

The mouse pointer behaves different when working with some applications, and it could be difficult to place the insertion point of the mouse pointer in the  text

Therefore, the correct options are;

It is difficult to put the mouse pointer's insertion point in the text and

A gray border appear around the time and date when you point to it.

When attaching a file or files in outlook 365 you select the attach command and then select the files location

Answers

Answer:

When you click the attachment button a window pops up allowing you to select the file/s you want to upload

You can also drag and drop file/s this is an alternative method

Explanation:

Microsoft Outlook is a personal information manager software system from Microsoft.

Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia

Other Questions
Need help please and thanks CAN ANYONE HELP NE WITH THIS ONE TOO?? The image below is a triangle drawn inside a circle with center o. which of the following expressions shows the area in square inches of the circle? A: 3 x 3.14 x 2 ^2B: 3.14 x 3 ^2C: 3.14 x 2 ^2D: 3.14 x 3< btw can you provide an explanation while answering? Im a bit lost here lol thank you List out five protocols you have followed during the pandemic. What are mycelium?????????? What played a key role in the French, Russian, Chinese, and Cuban revolutions?A. the nobility's goals to control all of the landB. the monarchy's desire to decrease servants' wagesC. the peasants' desire to break down class structuresDarD. the government's desire to guarantee individual liberties HELP ME OUT PLEASEEEEEEEEEEEe solve 3x-y=7 for x if weird answer will report Choose the inequality that represents the following graph. please help me, i need it right now !! Lorenzo wants to know how much it will cost to rent tables and chairs for an event. He investigates renting tables and chairs and decides to use two different companies. Company A $4 per table (seats 4) and a $25 one-time delivery and pickup fee Company B $2 per chair and a $15 one-time delivery and pickup fee Each table seats 4 people, so Lorenzo needs to rent 4 chairs for every table. x = number of tables Cost to rent tables from Company A: f(x) = 4x + 25 Cost to rent chairs from Company B: g(x) = 2(4x) + 15 Which function represents the total cost for Lorenzo to rent x number of tables and the chairs he needs to go with them? 12x 12x2 + 40 12x + 40 8x + 40 Assume that you invest 5 percent of your salary and receive the full 5 percent match from East Coast Yachts. What EAR do you earn from the match Give two examples from chapter 12-13 showing Holden intentionally withdrawing from people Question Help A company is convinced of the benefits of exercise for its workers. Healthy employees take fewer sick days and tend to be more focused on their job. In addition, exercise enhances the workers' positive moods. The company is so persuaded of the value of exercise that it has adopted a new policy: Moving forward, all workers will be allowed to exercise during the work day for up to three hours per week. The reasoning behind the company's exercise policy assumes that ________. as the population size getsThe growth rate tends to closer to the carrying capacity. What is the answer ? Enter the range of values for x:B152x - 1048A18[?] Enter Help!!!!!!!Solve for x. Round to the nearest tenth of a degree, if necessary. A store purchased a DVD for $12.00 and sold it to a customer for 50% more than the purchase price. The customer was charged a 7% tax when the DVD was sold.What was the customers total cost for the DVD?