Column in a database table

Assignment Help Basic Computer Science
Reference no: EM132187596

1-All of the data about one person or item makes up a:

field

table

report

record

2- Each column in a database table is a

field

query

form

record

3- This database object display data in a custom format. They are often easier to read than tables.

filter

form

report

field

4-Access is a ______ program.

spreadsheet

word processing

desktop publishing

database management

5-This database object is often a more convenient way to enter and view records than a table.

filter

form

report

query

6-The view that is used to modify objects is called

Print Preview

Form View

Datasheet View

Design View

7-What data type should you choose for a field that will contain words?

Currency

Yes/No

Date/Time

Text

8-What data type would you choose for a field where examples of entries are March 3, 2008 and September 4, 2007?

Number

Currency

Date/Time

Short Text

Yes/No

9-This database object is arranged in rows and columns and looks similar to an Excel worksheet.

Report

Table

Query

Form

Reference no: EM132187596

Questions Cloud

Determining the independent expressions : Suppose a program contains the declaration String s = "Hodor!, Java, Hodor!";
Name a security protocol for that layer : The OSI addresses security at which layer? Name a security protocol for that layer.
Novel algorithm could be legally protected : Protection of a software program that uses a unique, novel algorithm could be legally protected by
Virtualized and cloud environment : Explain various security concerns and measures in the virtualized and cloud environment.
Column in a database table : This database object display data in a custom format. They are often easier to read than tables.
What is the rotational speed of the disk : 1) What is the rotational speed of the disk? 2) What is the transfer time for one sector?
Measure the usefulness of the words : 1. Why can't we use TF alone to measure the usefulness of the words?
Develop and test a user-defined aggregate : Develop and test a user-defined aggregate to calculate n factorial {n!), where n is an integer.
Show data changing over time : Explain what types of graphs would be appropriate to show data changing over time and why.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discussion-ethics in action

In 1980, the US Congress enacted the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA), commonly referred to as the Superfund.

  Central role of it in the contemporary business organization

Understand the central role of IT in the contemporary business organization. Understand the impact of the World Wide Web on the management of business

  Who do the sites promoting these toolsclaim to support

Who do the sites promoting these toolsclaim to support?

  Explaining the most common security threats

Create a 10-slide presentation explaining the most common security threats, modern threats to current Client and Server Operating Systems

  Create a summary slide

create a summary slide

  How would you normalize this relation

Try to determine which sets of attributes form keys of R. How would you normalize this relation?

  Information security problem or issue in organisation

Illustrate how the work breakdown structure would identify and plan an information security problem or issue in the organisation.

  Do the rules lead to the same possible executions

It is possible to write an if statement in terms of a case statement. How? This implies that case could have been put in the kernel language instead of if, and if could have been defined as a linguistic abstraction.

  How many effective unique keys does the playfair cipher have

how man ypossible keys does the playfair cipher have?ignore the fact tha some keys might produce identical encription result.express your ansewr as an pproximate power of 2.

  Why then do we have weak entity sets

Why, then, do we have weak entity sets?

  Describe significance of having test coupled with real users

Describe the significance of having test coupled with real users' views of product at the end of development effort,even if it is test of a prototype and not the completely developed software.

  Describe some of the challenges a forensic investigator

Describe some of the challenges a forensic investigator faces with collecting evidence in a cloud environment

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd