1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
1 year ago
10

What is the following file format called? inv_nbr, inv_name, inv_cost 876521,battery,45.00

Computers and Technology
1 answer:
kiruha [24]1 year ago
6 0

The  following file format of  inv_nbr, inv_name, inv_cost is called delimited format.

<h3>What is a delimited file in Excel?</h3>

The term "Delimited" is known to be a term that connote a form of  an  TXT file that tends to make use of tabs or an  CSV file that uses commas to  be able to separate and group your data.

Note also that a  delimited file is seen as a form of a given sequential file that is made up of column delimiters.

Therefore, The  following file format of  inv_nbr, inv_name, inv_cost is called delimited format.

Learn more about text format from

brainly.com/question/16397886

#SPJ1

Multiple Choice

fixed-width format

extensible markup

delimited format

hypertext format

You might be interested in
How does information technology most benefit people’s personal and professional lives?
ozzi

As many as 79% of employees now “work on virtual teams,” be it by email, online collaboration, messaging, video conferences, or some combination of any of the above. A 2013 Pew Research study found “94% of jobholders are Internet users.” This includes full-time, part-time, and freelance workers in technology companies, big corporations, and small businesses, who work in cities, the suburbs, rural America, and everywhere in between.

For most of the last century, communicating professionally meant writing letters, sending faxes, or spending hours on the phone. Not anymore. Email is now the primary means of communication in the modern workplace. We are communicating more, faster, and better than ever before. And employers have been reaping the benefits. A major report cited by British newspaper The Telegraph found that the incorporation of technology into the workplace has led to an “84% increase in productivity per hour for office workers since the 1970s.” The major influencers? Email, business software, and yes, even cell phones.


3 0
3 years ago
Read 2 more answers
Examine the following algorithm.
kodGreya [7K]

Answer:

See the explanation please

Explanation:

A.

The algorithm tries to subtract the number of credits taken so far and the required credits for the degree before getting the number of credits required for the degree program and the number of credits the student has taken so far. Since the values are not known, calculation cannot be done.

Write the step 3 after step 5

B.

Step 1, 2, 4, 5 require user interaction, since it is asking the user to enter values

5 0
3 years ago
List pros and cons of HCI technology​
Verdich [7]
A pro of HCI technology is that its user friendly and a con about it is that you have to teach the user what to do or guide them!
8 0
3 years ago
Read 2 more answers
Need help with this
andrezito [222]

Answer:

13:a. 15:c. 14:Unknown answer

6 0
2 years ago
How long would it take a 8 bit computer to calculate π to the thousandth place?
allochka39001 [22]
The average speed of an 8 bit computer is 0.50 MIPS or million instructions per second. There are three  thousand instructions per digit of the number in <span>π, the thousandth place needs 4 x 3 = 12 thousand instructions. The time it takes to do this is 12000 / (0.5 x 1000) = 24 seconds.

</span>
7 0
3 years ago
Other questions:
  • Here are the codes for producer and consumer problems.
    10·1 answer
  • What is a geotag?
    10·1 answer
  • Which of the following is a malicious program that can replicate and spread from computer to computer?
    8·2 answers
  • Which of the following is NOT essential for individuals to have to build their own web page?
    9·1 answer
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • Define the function max2 that takes two integers as arguments and returns the largest of them. Then define the function max_list t
    11·1 answer
  • The base 10 number 18 is equal to which base 16 number?<br><br> 10<br><br> 12<br><br> 14<br><br> 16
    11·1 answer
  • ______________ is a raw fact about a person or an object
    6·1 answer
  • A task-oriented leader is ideal for a creative workplace.
    8·2 answers
  • Which option is an example of an algorithm that is used in daily life?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!