1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
1 year ago
10

What is the following file format called? inv_nbr, inv_name, inv_cost 876521,battery,45.00

Computers and Technology
1 answer:
kiruha [24]1 year ago
6 0

The  following file format of  inv_nbr, inv_name, inv_cost is called delimited format.

<h3>What is a delimited file in Excel?</h3>

The term "Delimited" is known to be a term that connote a form of  an  TXT file that tends to make use of tabs or an  CSV file that uses commas to  be able to separate and group your data.

Note also that a  delimited file is seen as a form of a given sequential file that is made up of column delimiters.

Therefore, The  following file format of  inv_nbr, inv_name, inv_cost is called delimited format.

Learn more about text format from

brainly.com/question/16397886

#SPJ1

Multiple Choice

fixed-width format

extensible markup

delimited format

hypertext format

You might be interested in
Implementing multiple types of technology and thereby precluding that the failure of one system will compromise the security of
Setler79 [48]

Answer:

Redundancy

Explanation:

  • There are several redundant computer systems that can be applied to various operating systems and platforms.
  •  In any case, a server usually has redundant components, disks, network cards and power supplies.
  • The servers usually have two network cards with data redundancy, so in case of failure we will always have one of them available.
  • In conclusion, data redundancy is a fundamental system for the correct storage of the data available in the database.
5 0
3 years ago
Learning Task 5. Identify the terms being described below. Write your answer in your answer
Charra [1.4K]

Answer:

1. Waste management.

2. Substitution.

3. Personal hygiene practices.

4. Emergency preparedness.

5. Elimination.

6. Flammability limit.

7. Occupational safety and health (OSH).

8. Engineering controls.

9. Personal protective equipment (PPE).

10. Administrative controls.

Explanation:

1. <u>Waste management</u>: this refers to the collection, transportation, processing or disposal, managing and monitoring of waste materials.

2. <u>Substitution</u>: this refers to the hazard control which involves the measure of replacing one hazardous agent or work process with less dangerous one.

3. <u>Personal hygiene practices</u>: a very important method of controlling hazards which involves proper washing of your hair, skin, body and even your clothes.

4. <u>Emergency preparedness</u>: this refers to the preparedness for the first and immediate response in case of any type of emergency.

5. <u>Elimination</u>: this hazard control refers to the removal of a specific hazard or hazardous work process.

6. <u>Flammability limit</u>: is the term used to call the range of concentration over which a flammable vapor mixed with air will flash or explode if an ignition is present.

7. <u>Occupational safety and health (OSH)</u>: a cross-disciplinary area concerned with protecting the safety, health and welfare of people engaged in work or employment.

8. <u>Engineering controls</u>: the term used in hazard control which involves changing a piece of machinery or work process.

9. <u>Personal protective equipment (PPE)</u>: the term used to call any piece of equipment which is used to protect the different parts of the body such as ears and eyes such as respirators, face mask, face shield, gloves, boots, etcetera.

10. <u>Administrative controls</u>: this is a form of hazard control which involves manipulation of worker/employee’s schedule and job rotation.

7 0
3 years ago
What are Important advice to include about spyware, viruses, and other types of malware?
Contact [7]
They can corrupt data giving away confidential information, which in some cases is a violation of customer privacy and should be taken very seriously. Also it can slow the machine down exponentially. Some malware can delete files required for the machine to run and ultimately render it useless.
3 0
3 years ago
The Java Math class is a collection of static methods, one of which is sqrt(number). It accepts a numeric argument and returns t
Sveta_85 [38]

In Java, you would simply type:

Math.sqrt(25);

To print the square root of 25 to the console, you would type:

System.out.println(Math.sqrt(25));

I hope this helps!

3 0
3 years ago
Read 2 more answers
Although they can display a wealth of data, why should chord diagrams be used with caution?
ladessa [460]

Although chord diagrams can display a wealth of data, a reason why chord diagrams should be used with caution is because: A. Chord diagrams are particularly susceptible to fisheye distortion as you focus on certain data points.

<h3>What is data?</h3>

Data can be defined as a representation of factual instructions (information) in a formalized manner, especially as a series of binary digits (bits) that are used on computer systems in a company.

In this scenario, the essential features of a data which every department manager should list include the following:

  • Strong security
  • Centralization
  • Programmatic access.

<h3>What is a chord diagram?</h3>

A chord diagram can be defined as a type of chart that is typically designed and developed to graphically represent or display the inter-relationships (many-to-many relationship) between data in a matrix, especially as curved arcs within a circle.

Although chord diagrams can display a wealth of data, a reason why chord diagrams should be used with caution is because they are particularly susceptible, vulnerable, or prone to fisheye distortion as the end user focus on certain data points.

Read more on data here: brainly.com/question/13179611

#SPJ1

4 0
2 years ago
Other questions:
  • An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect t
    8·1 answer
  • Suppose you are the security manager of a company and one of your goals is to design security mechanisms based on three security
    10·1 answer
  • Should organizations that promote free trade have environmental or social checks and balances?
    14·1 answer
  • Why is brainly not working it say im logged out rn but im not i cant acces anything but this
    12·2 answers
  • Which of the following attack is a threat to confidentiality?
    10·1 answer
  • Which technique is used to convert a color image to a black and white image?
    12·1 answer
  • Prolog uses ____. Select one: a. lowercase for variable names, and uppercase for constants and functions b. uppercase for variab
    12·1 answer
  • Help ASAP!!! During which phase of a well-structured study session is each occurring?
    14·2 answers
  • Write a short-essay discussing your own stand on social media usage for students.​
    5·1 answer
  • Who invented the first mechanical computer? in what year was it invented?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!