NEED HELP WILL MARK BRAINLIEST AND 25 POINTS FOR ANSWER Which section available in the Design view for the form actually includes the record data itself?

header

footer

detail

Overview

Answers

Answer 1

Answer:

the answer is detail

Explanation:

please it's detail

Answer 2

The Design view for the form actually includes the record data itself will be known as Overview.

What is a detail?

If the file is completed, then all the record that was done during completing the file will be mentioned in the section known as detail.

The Design view for the form actually includes the record data itself will be known as detail.

Then the correct option is D.

More about the detail link is given below.

https://brainly.com/question/9208069

#SPJ2


Related Questions

what security issues could result if a computer virus or malware modifies your host file in order to map a hostname to another IP address

Answers

Answer:

Man-in-the-middle attack

Explanation:

In this type of attack, the hacker uses the virus or malware to get and change his IP address and hostname to match the address and hostname of the target host computer. The allows the hacker to gain access to information sent to the target IP address first.

how do u mark brainlyest on the computer

Answers

Answer:

Explanation:

An answer on Brainly can only be marked as Brainliest if the individual who answered the question is not yourself, and if one week has passed since the answer was posted. Once the week has passed and the answer is still there (has not been removed) then a Brainliest button should appear that will allow you to mark the answer as Brainliest. Simply click the button and the answer will be marked as Brainliest.

What are the three general methods for delivering content from a server to a client across a network

Answers

Answer:

Answered below.

Explanation:

The three general methods consist of unicasting, broadcasting and multicasting.

Casting implies the transfer of data from one computer (sender) to another (recipient).

Unicasting is the transfer of data from a single sender to a single recipient.

Broadcasting deals with the transfer of data from one sender to many recipients.

Multicasting defines the transfer of data from more than one sender to more than one recipients.

According to shared security model, which two are a customer's responsibilities in Oracle Cloud Infrastructure (OCI)?

Answers

Answer:

According to shared security model, a customer's responsibilities in Oracle Cloud Infrastructure (OCI) are:

1. Workloads security: The customer is responsible for protecting the work function or a distinct capacity, like a Hadoop node, a Web server, a database, or a container, that it puts on the cloud.

2. Services configuration:  The customer is also responsible for securing the specifications that describe the different aspects of its managed service.

Explanation:

Responsibilities are shared between Oracle and the customers using the Oracle Cloud Infrastructure (OCI).  Oracle is solely responsible for the security of the underlying cloud infrastructure (such as data-center facilities, hardware, and software systems), while the customer is responsible for securing the workloads and configuring their services to suit their individual needs.

I WILL MARK YOU BRAINLIEST NEED HELP ASAP....Name at least three actions you can perform on a inserted image

Answers

Answer:

you can move it you can shrink it and you can put a text box on it

Write a list comprehension statement to generate a list of all pairs of odd posi

Answers

Answer:

Print([(a,b) for a in range(10) for b in range(10) if (a < b and a%2 == 1 and b%2 == 1)])

Explanation:

Here, we declared a range of value for a and b using a for loop and the range function. The values are the first 10 numeric digits. The we used the if statement to establish our constraints;

In other to ensure that ;

Lower digit is written first ; (a < b) ;

Only odd numbers are considered,

a%2 == 1 ; b%2 == 1 (remainder when a and b are divided by 2 is 1.

Both a and b are declared as a tuple in other to obtain a pair of odd values.

When we add suffix L to a integer it is called as __________​

Answers

Answer:

Long integer literal.

Explanation:

Integer literal can be defined as numbers that do not contain any decimal point or augmented part. An integer literals can be characterized as decimal, octal, or hexadecimal constant. When an integer liteal is added with prefix it tends to define its base, whereas suffix define its type.

The suffix L to an integer literal means long integer literal. The suffix can be written in any form, either upper case (L) or lower case (l).

Therefore, the correct answer is long integer literal.

list the difference between sdram and dram​

Answers

Answer:

i need this for a challenge

Explanation:

What is a variable?

A.a box (memory location) where you store values

B. a type of memory

C. a value that remains the same throughout a program

D. a value that loads when the program runs

Answers

Answer. D: a value that looks loads when the program runs.


Explanation:

In programming, a variable is a value that can change, depending on conditions or on information passed to the program. Typically, a program consists of instruction s that tell the computer what to do and data that the program uses when it is running.

Write a program that takes a set of numbers and determines which is the smallest. Ask the user for the following information, in this order: A terminating value (real number). The user will enter this value again later, to indicate that he or she is finished providing input. A sequence of real numbers. Keep asking for numbers until the terminating value is entered.

Answers

Answer:

This solution is implemented in C++:

#include<iostream>

#include<bits/stdc++.h>

using namespace std;

int main(){

double termnum;

cout<<"Terminating number: ";

cin>>termnum;

 

double num;

vector<double>numbers;

cout<<"Number: ";

cin>>num;

while(num!=termnum){

numbers.push_back(num);

cout<<"Number: ";

cin>>num;

}

double smallest = numbers.at(0);

for(double x:numbers){

 if(x < smallest){

  smallest = x;

 }

}

 

cout<<"The smallest is "<<smallest;

return 0;  

}

Explanation:

This declares the terminating variable as double

double termnum;

The next italicized lines prompts user for terminating value

cout<<"Terminating number: ";  

cin>>termnum;

This declares the user input variable as double  

double num;

This declares vector of numbers as double

vector<double>numbers;

The next italicized lines prompts user for number

cout<<"Number: ";

cin>>num;

The following iteration is repeated until the terminating value equals the number supplies by the user

while(num!=termnum){

This pushes the number to a vector

numbers.push_back(num);

The italicized lines prompts user for another number

cout<<"Number: ";

cin>>num;

}

This declares and initializes variable smallest

double smallest = numbers.at(0);

The following for loop determines the smallest of the number set

for(double x:numbers){

 if(x < smallest){

  smallest = x;

 }

}

 This prints the smallest of the set

cout<<"The smallest is "<<smallest;

return 0;

Also: See attachment

A __________ is the blueprint for __________ having similar attributes and behaviors. signature, objects class, parameters header, objects signature, parameters class, objects

Answers

Answer: E. class, objects

Explanation:

A class is the blueprint for objects having similar attributes.

As much as classifying something means to define it based on the characteristics that is has that are similar to other things in that class, so also is a class here.

A class is the blueprint or rather template for making objects that have similar attributes which means that the class therefore gives the object its various attributes and its behavior.

How many total beats are these tied notes worth, assuming a quarter note equals 1 beat?
A. One
B. Five
C. Three

Answers

Answer:

one i think

Explanation:

A single inheritance model means: * A) A class can only have one parent class (superclass) B) A class can only have one child class (subclass) C) A class cannot have a parent class (superclass) D) A class cannot have a child class (subclass) E) A class can have multiple parent classes (superclasses)

Answers

Answer:

The answer is A)

Explanation:

In programming languages like java you can only use single inhertance meaning a class can only inherit attributes from one class. But in other languanges like C you can have multiple inhertance

The distance a vehicle travels can be calculated as follows: distance = speed * time For example: If a train travels 40 miles per hour for 3 hours, the distance traveled is 120 miles.Write a program that asks the user for the speed of a vehicle (in miles per hour) and how many hours it has traveled. The program should use a loop to display the distance the vehicle has traveled for each hour of the time period.

Answers

Answer:

In Python:

speed = float(input("Speed: (mile/hr): "))

time = int(input("Time: (hr): "))

for hour in range(1,time+1):

    distance = speed * hour

    print("Distance: "+str(speed)+"*"+str(hour)+" = "+str(distance))

Explanation:

This prompts the user for speed in mile/hr

speed = float(input("Speed: (mile/hr): "))

This prompts the user for time in hr

time = int(input("Time: (hr): "))

This iterates through the input time

for hour in range(1,time+1):

This calculates the distance covered in each hour

    distance = speed * hour

This prints the distance covered in each hour

    print("Distance: "+str(speed)+"*"+str(hour)+" = "+str(distance))

a user reports that her computer monitor will not allow her to switch back and forth between Microsoft word and internet explorer.

Answers

Answer: B. Interrupts

Explanation:

Interrupts is a feature of digital computers that enables the interruption of the process the computer is currently engaged in so that the computer can process the new command. Interrupts is the reason I am able to type this answer because interrupts is interrupting my browser to process my typing.

If a user reports that their computer monitor will not allow her or him to switch back and forth between Microsoft Word and Internet Explorer, it is possible that the interrupts function is not working effectively to enable the switch. by interrupting one of the programs.

Answer:

.....................

B. Interrupts

Text refers to:

A. all forms of printed media
B. any collections of words.
C. Printed, visual, and audio media.
D. written information only.

Answers

Answer:

B

Explanation:

You need to save a document and be absolutely sure that none of the formatting is lost. Which of these document formats would be best?

1) DOC

2) HTML

3) PDF

Answers

In my opinion the one that would be the best is 3. PDF but it could also be 1. DOC

According to the video, what are some concerns of Webmasters? Check all that apply.
how fast the website can be accessed
how many writers provide content for a website
how to create images for a website
the number of similar websites that exist
the time it takes for elements on a website to download
website security and privacy

Answers

Answer:

A.how fast the website can be accessed

E.the time it takes for elements on a website to download

F.website security and privacy

Explanation:

Answer:

1,5,6

Explanation:

hope this helps gg

What is the volume of a rectangular prism with a length of 812 centimeters, width of 913 centimeters, and a height of 1225 centimeters?

Answers

Answer:

guys all you have to do is divide and multiply 812x913=741356

and this answer they give you going divide 741356. 1225

so easy guys let me in the comment

Explanation:

Write a function called is_even that takes one parameter and returns a boolean value. It should return True if the argument is even; it should return False otherwise.

The is_even function should not print anything out or return a number. It should only take in a number and return a boolean.

Note: Be sure to include comments for all functions that you use or create.

For example, if you made a call like

is_even_number = is_even(4)
is_even_number should have the value True.

Once you’ve written this function, write a program that asks the user for integers and prints whether the number they entered is even or odd using your is_even function. You should let the user keep entering numbers until they enter the SENTINEL value.

Here is a sample run of the program:

Enter a number: 5
Odd
Enter a number 42
Even
Enter a number: -6
Even
Enter a number: 0
Done!

(CODEHS, PYTHON)

Answers

def is_even_number(n):

   return True if n % 2 == 0 else False

while True:

   number = int(input("Enter a number: "))

   if number == 0:

       break

   else:

       if is_even_number(number):

           print("Even")

       else:

           print("Odd")

I wrote my code in python 3.8. I hope this helps.

please help me please help me.​

Answers

Answer:

dont know man thanks for points tho

but it is 209

Explanation:

Brian has created the following selection sort class in Java. In which line is the index of the smallest value returned? In which line is the input array given as an argument?

public class SelectionSort{
private static int positionMin (int] vals, int startPosition) {
int minPosition startPosition;
for (int i startPosition; i
if (vals[i] vals[min Position]) {

minPosition = i;
return min

Position; private static void swap(int] vals, int firstPosition, int secondPosition) {

int temp; temp vals[firstPosition];
vals[firstPosition] vals[second Position];
vals[secondPosition] temp return public static void selSort(int| vals) {
int minPos for (int startPos 0; startPos< vals.length; startPos++){

minPos positionMin(vals,startPos); swap(vals,startPos, min Pos) ;

for (int i 0; i< vals.length; i++) { if(i
}else Jelse { System.out.println(vals[i]); } }; }

return; } }

Answers

Answer:

Explanation:

Since there are no line numbers in this question I will start counting from public class SelectionSort{ as line 1 and so on, as well as provide the code on that line.

The index of the smallest value is returned on line 8 where it says return min which shouldn't have any spaces and should be return minPosition;

The input array is given as an argument at the beginning of the function on line 2 where it says private static int positionMin (int] vals, int startPosition) {, as the variable vals.

This input array is also used as an argument on line 10 where it says Position; private static void swap(int] vals, int firstPosition, int secondPosition) and line 15 where it says vals[secondPosition] temp return public static void selSort(int| vals) {

Which 2 problems does the Pay down credit card workflow solve for clients? (Select all that apply) It helps clients stay on top of making payments on time It ensures that payments to credit card accounts are categorized correctly It provides a lower rate than most credit cards to qualified small businesses It uses language that non-accountants can understand

Answers

Answer:

B. It ensures that payments to credit card accounts are categorized correctly

D. It uses language that non-accountants can understand

Explanation:

Pay down credit card workflow is a new feature that makes entering records in QuickBooks easier for users. The two prime benefits of this workflow are;

1. It ensures that payments to credit card accounts are well categorized well. Without this feature, users most times find it difficult to enter records correctly or they tend to duplicate entries. This new feature obtains vital information that helps the software to correctly credit the accounts.

2. It uses language that non-accountants can understand. This simplifies the process and makes it easier for the user to enter the right data that would help the software to correctly credit the accounts.

Modify your program from Learning Journal Unit 7 to read dictionary items from a file and write the inverted dictionary to a file. You will need to decide on the following: How to format each dictionary item as a text string in the input file. How to covert each input string into a dictionary item. How to format each item of your inverted dictionary as a text string in the output file. Create an input file with your original three-or-more items and add at least three new items, for a total of at least six items.

Answers

Answer:

Following are the code to this question:

import ast as a #import package ast

d1= {}#defining an empty dictionary  

def invert_dictionary(d1):#defining a method invert_dictionary

   i = dict()#defining variable i that hold dict method  

   for k in d1:#defining for loo to check dictionary value

       val = d1[k]#defining val variable to holds dictionary key values

       for val1 in val:#defining another for loop to hold value of dictionary and inverse it

           if val1 not in i:#defining if block to check value

               i[val1] = [k]#hold key value

           else:#defining else block

               i[val1].append(k)#add value in dictionary

   return i#return inverse value

with open("dict_items.txt", "r") as data:#use open method to add a list as a file

   dict_item = a.literal_eval(data.read())#defining a variable that covert item as a text string in the input file  

   '''covert input string into dictionary item'''

   e_val = input("Please enter a value")#defining variable e_val to input value

   dict_item['4']=str(e_val)#holding value in dictionary

   dict_item['5']='e'#holding value in dictionary

   dict_item['6']='f'#holding value in dictionary

   '''Invert the dictionary value '''

   invert_data =invert_dictionary(dict_item)#defining variable to holding method value

'''calculating the format of each item of inverted dictionary as a text string output file.'''

f_data = {i:str(j[0]) for i,j in inverted_data.items() }#defining f_data to hold coverted value

import json as j#import package

with open('out_put.txt', 'w') as file:#use open method to open file

   file.write(j.dumps(f_data))#add value

Explanation:

In the above-given code has four parts which can be defined as follows:

In the first part, a method invert_dictionary is defined that accepts a dictionary, and defines two for loops in which the second loop uses a conditional statement to convert the inverse form and return its value, and after inverse it use the open method to add a list as a file, and defining a variable that covert item as a text string in the input file.

In the second step, a variable e_val is declared for input value , and use the dict_item variable to holding dictionary  value, and call the method and hold its value.

In the third and fourth step it calculating the format of each item of inverted dictionary as a text string output file.

A counter is ?

A. used only outside of the loop

B. none of the above

C. a variable used in a loop to count the number of times an action is performed

D. A person with a pen and paper

Answers

Answer: In digital logic and computing, a counter is a device which stores (and sometimes displays) the number of times a particular event or process has occurred, often in relationship to a clock. The most common type is a sequential digital logic circuit with an input line called the clock and multiple output lines.

NEED HELP WILL MARK BRAINLIEST 25 POINTS FOR ANSWER
Which option is typically only used when utilizing self joins?

display name

alias

relationship

primary key

Answers

Answer:

relationship

Explanation:

Answer:

I agree the should be C)relationship

Explanation:

edg 2021

If an insurance policy covers individual losses up to $10,000 and has a deductible of
$500, the insured will be paid how much in the event of a covered loss of $5,000?

Answers

Answer: $4500

Explanation:

The deductible is the amount that the insured that is, the policy holder will have to pay. In this case, there is a covered loss of $5000 and the insured has a deductible of $500.

Therefore, the amount that the insured will be paid will be the difference between $5000 and the deductible of $500. This will be:

= $5000 - $500

= $4500

we need to send 254 kbps over a noiseless channel with a bandwidth of 15 khz. how many signal levels do we need

Answers

Answer:

The level of the signal is 353.85

Explanation:

Data rate determines the speed of the data transmission.

The data rate depends on the following factors

The available bandwidthnumbers of signal levelsthe quality of the channel ( Means the level of noise )

The data is transmitted either from a noiseless channel or a noisy channel.

The given quality of the channel in the question is noiseless.

Use the following formula to calculate the signal levels

Bit rate = 2 x bandwidth x [tex]Log_{2}[/tex] ( signal level )

where

Transmitted Data = 254 kbps = 254,000 bps

Bandwidth = 15 khz = 15,000 hz

Placing values in the formula

254,000 = 2 x 15,000 x [tex]Log_{2}[/tex] ( L )

254,000 = 30,000 x [tex]Log_{2}[/tex] ( L )

254,000 / 30,000 = [tex]Log_{2}[/tex] ( L )

8.467 = [tex]Log_{2}[/tex] ( L )

L = [tex]2^{8.467}[/tex]

L = 353.85 levels

Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access and use information.

Answers

Answer:

The answer is "Confidentiality"

Explanation:

Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach  can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.

Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.

Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.

The _____ Tag surrounds all content that will be visible on your web page for all to users to see on that website.

Answers

Answer:

The body tag

Explanation:

HTML has several tags; however, the tag that handles the description in the question is the body tag.

It starts with the opening tag <body> and ends with closing tag </body>

i.e.

<body>

[Website content goes in here]

</body>

Any text, image, object etc. placed within this tag will be displayed in the website

Other Questions
Which best characterizes Russia in the early 1900s?O The government was attempting to repair an aging infrastructure.O The wealthy class was growing due to a boom in employment.O The military was using force to subdue uprisings caused by famine.O The economy was stalled because there was nothing to export. The two triangles shown are congruent: AFHG=AJKL. Based on this information,which of the following is a true statement?A) HELLB) JK= FGOC) GELD Part 1Which of the following themes is most supported by this line from the passage?"Go away, I am not making myself ill.' No, she was drinking in a very elixir oflife through that open window.A. Each individual must make decisions based on what he or she knows to bebest for his or her own life,B. Family members or close friends can sometimes recognize a need that weare unwilling to admit about ourselves,C. We sometimes shut out other people when we actually need them themost.D. The death of a loved one is something that some people never recoverfrom. Between what two multiples of ten is 328 The energy of a given wave in the electromagnetic spectrum is 2.64 10-21 joules, and the value of Plancks constant is 6.6 10-34 jouleseconds. What is the value of the frequency of the wave? I have no idea what the answer is Marisa wants to buy an iPad. Shealready saved $25 and plans tosave an additional $10 each week.Write an expression that representsthe total amount of money Marisahas saved after any number ofweeks. Use w for number of weeks. Tonya had sold eight boxes of cookies by the time she realized themoney envelope had been lostWhich revision corrects the inappropriate shift in verb voice?A. Tonya had sold eight boxes of cookies by the time the moneyenvelope was realized to have been lostOB. Tonya lost the money envelope and realized it after eight boxes ofcookies had been sold,c. Tonya had sold eight boxes of cookies by the time she realizedthat she had lost the money envelopeD. Eight boxes of cookies had been sold by Tonya by the time sherealized she had lost the money envelope, PLEASE HURRY UP AND ANSWER :)The story is called: AND THE DRILLING BEGINS The Question: People knew there was rock oil in Titusville because of the? Please answer!! I added a screenshot HELPPPPPPPPP BRAINLIEST. PLZZZzzzzzWhich is a problem associated with deforestation? Group of answer choicesNative people have too much forest for their needs.There is less forest to produce goods that humans need.More oxygen is available on the planet.Poor people earn money from selling trees. 2 examples of peer pressure in The Sneetches A person has the sudden inability to detect odors. What disorder could be causing this?hyposmiadysosmiaanosmiaparosmiaAnother person has an altered perception of smell, which consists of an unpleasant odor. What condition does this person likely have?hyposmiadysosmiaanosmiaparosmia Write 0.4% as a fraction or mixed number in simplest form. Find the request values Geometry How does the reign of terror betray the ideals of the revolution of liberty, equality, and fraternity?I will give Brainliest please answer Use the Distributive Property to solve the equation. -2(x + 4) = 8 Apply the Distributive Property and simplify. - 2x+ what = 8 What is 25*25? Yehawwwwwwww 9. The diagram shows a triangle inscribed in a circle with centre O.The lengths of the shorter sides of the triangle are 6 cm and 8 cm.Work out the area of the circle.Use = 3.14. Help!!A 41-foot rope is stretched from the top of a 40-foot flagpole to the ground. How far is the base of the flagpole from the end of the rope.