1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
2 years ago
15

To create a query, users can either type a query using sql or, more commonly, use the query tools built into the dbms (such as a

query design screen or query ____) to create a query object.
Computers and Technology
1 answer:
sattari [20]2 years ago
8 0
The answer is : wizard
You might be interested in
13. Place where names, addresses and email information<br> is stored
yanalaym [24]

Answer in ur email

Explanation:

8 0
3 years ago
Need help ASAP <br><br> Thankss + BRAINLIST only for correct answers
AVprozaik [17]
Why visit it?
For entertainment, purely for the user to enjoy the content that has been produced for them.

Why was it made?
Netflix is a subscription based service that has been made to allow users to stream TV shows and other entertainment sources. It was made for leisure.
7 0
3 years ago
What type of software repairs or improves a larger application that is already installed on a system?
earnstyle [38]

Answer:

<h2>Mapping</h2>

Explanation:

<h2>Hope it helps you</h2>
7 0
3 years ago
Read 2 more answers
4) Short answer questions<br>c) What is Cyber Law?​
Kamila [148]

Answer:

Kindly check explanation

Explanation:

Laws refer to legal rules and regulatory framework which is used as a guiding principle to define the actions and behavior which may lead to incurring penalties if boundaries are trespassed.

The word 'Cyber' is popularly used to describe activities, actions and interactions involving the internet. With the burst and continous pace of digital transformation, the internet also called Cyberspace is in a world of its own. Hence, the creation of rules to govern internet interactions.

Cyber laws may thus be explained as codified laws which are designed and implemented to govern all forms of possible online interaction or transactions in other enhance cyber security to protect the interest of persons and data from various forms of internet threats. Cyber laws include ; Data protection laws, Computer crime laws, telecommunication laws and so on.

6 0
3 years ago
Plsss help u will get brainliest
liberstina [14]

Answer:

Young-at-Heart having a youthful or fresh spirit not depended of one's age; act in a way like younger person does.

Yare lively; eager; keen; agile; dexterous; ready; prepared.

Explanation:

got those ones hope it helps

4 0
3 years ago
Read 2 more answers
Other questions:
  • E gpa(grade point average) you need to have or you get kicked out of robotics for middle school?
    13·1 answer
  • What is working with others to find a mutually agreeable outcome?
    6·1 answer
  • Where would the information needed to start a computer be stored
    10·1 answer
  • Your wireless network has been breached and it seems as though the attacker has modified a portion of your data that is used wit
    12·1 answer
  • A technician has a client’s laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooti
    10·1 answer
  • The introduction of new information technology has a: A. dampening effect on the discourse of business ethics. B. waterfall effe
    14·1 answer
  • What is a Computer ?and it's demerits​
    13·2 answers
  • In a mobile phone network, how many times as strong would
    6·1 answer
  • I know I'm asking for a lot. But this is my last question. If we do it I pass my semester. help please.
    15·1 answer
  • What are benefits of AI
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!