1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
1 year ago
10

What is the following file format called? inv_nbr, inv_name, inv_cost 876521,battery,45.00

Computers and Technology
1 answer:
kiruha [24]1 year ago
6 0

The  following file format of  inv_nbr, inv_name, inv_cost is called delimited format.

<h3>What is a delimited file in Excel?</h3>

The term "Delimited" is known to be a term that connote a form of  an  TXT file that tends to make use of tabs or an  CSV file that uses commas to  be able to separate and group your data.

Note also that a  delimited file is seen as a form of a given sequential file that is made up of column delimiters.

Therefore, The  following file format of  inv_nbr, inv_name, inv_cost is called delimited format.

Learn more about text format from

brainly.com/question/16397886

#SPJ1

Multiple Choice

fixed-width format

extensible markup

delimited format

hypertext format

You might be interested in
802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size bonded channels d
bulgar [2K]

Answer:

The 802.11ac wireless standard takes channel bonding to a higher level because it can support 20MHz, 40MHz, and 80MHz channels, with an optional use of 160MHz channels.

Explanation:

The 802.11ac is a standardized wireless protocol established and accepted by the institute of electrical and electronics engineers (IEEE). 802.11ac as a wireless local area network (WLAN) protocol, has multiple amplitude and bandwidth, thus making it to be the first standard wireless protocol to have the ability to operate on a Gigabit (Gb) network.

Generally, the 802.11ac wireless standard provides an advantage over 802.11n by incorporating increased channel bonding capabilities. The 802.11ac wireless standard takes channel bonding to a higher level because it can support 20MHz, 40MHz, and 80MHz channels, with an optional use of 160MHz channels.

<em>On the other hand, 802.11n is a standardized wireless protocol that can support either a 20MHz or 40MHz channel. </em>

6 0
3 years ago
Header and footer elements such as worksheet name, current date, and time are _____ elements, they change as your worksheet does
mario62 [17]
<span>Header and footer elements such as worksheet name, current date, and time are dynamic elements, they change as your worksheet does. Because the information they </span><span>contain ( page number, date,) changes that's why they are dynamic. Otherwise if the information was fixed, they would be static elements.</span>
7 0
3 years ago
Direction: Write True on the line if the statement is correct. Write False if the statement is incorrect. 1. All objects are com
jeyben [28]
<h2><u>ANSWER</u><u>:</u></h2>

  1. <u>TRUE</u>
  2. <u>FALSE</u>
  3. <u>FALSE</u>
  4. <u>TRUE</u>
  5. <u>TRUE</u>
<h2><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u></h2>

<u>CARRY</u><u> </u><u>ON</u><u> LEARNING</u>

<u>CAN</u><u> </u><u>YOU</u><u> BRAINLEST</u><u> ME</u><u> PLEASE</u>

6 0
3 years ago
Read 2 more answers
The ____ command is used to disconnect a datatable object from the database. (
lisabon 2012 [21]
The delete from command I think
7 0
3 years ago
Read 2 more answers
A type of specialty processor devoted exclusively to protecting your privacy.
drek231 [11]
 Cryptoprocessor would be it.
8 0
3 years ago
Read 2 more answers
Other questions:
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • Which Game Is Better &amp; Favorite For You?
    12·2 answers
  • When we insert a new node into a red-black tree, we set the color of the newly inserted node n to red. observe that if we had ch
    15·1 answer
  • ​A(n) ____ will hold an online auction buyer’s payment until he or she is satisfied that the item bought matches the seller’s de
    13·1 answer
  • Lux Ladies, Inc., is a company that specializes in expensive and unusual gifts for all occasions. It keeps a large file of infor
    11·1 answer
  • __________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
    9·1 answer
  • A _____ is a number that summarizes an encrypted information. digital certificate hash function message digest hash algorithm
    8·1 answer
  • JUST NEED TO KNOW WHO ALL DOSE EDGINUITY
    12·2 answers
  • What blockchain implementation resulted from bitcoin’s rejection of a recommendation to enhance its scripting language support?
    9·1 answer
  • Write a program, TwoDimentionalGrid. Ask the user to enter the size of the 2 dimensional array. Here we are not doing any input
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!