1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnyKZ [126]
3 years ago
10

What does the group on option do?

Computers and Technology
1 answer:
luda_lava [24]3 years ago
5 0

Answer:

D. allows you to add calculations

Explanation:

GROUP ON is a database function that allows you to group together a series of results sharing common values for the indicated fields.  That allows you to add calculations.

You could for example, count how many students are in Mrs Brown's class, or how many of them had a grade of 80% or more on the last test.  Or instantly calculate the class' average for every teacher in the school, maybe grouped by teacher/level, and so on.

You might be interested in
Wich type of operating system is usually used in personal computers
Anvisha [2.4K]
The three most common operating systems for personal computers are Microsoft Windows, Apple Mac OS X, and Linux.
4 0
3 years ago
Read 2 more answers
Select all the correct answers. Which two statements are true about an OS? translates the user's instructions into binary to get
lubasha [3.4K]

Answer:

all

Explanation:

4 0
4 years ago
Jennifer has written a short story for children. What should be her last step before she submits the story for publication?
SSSSS [86.1K]

Answer:

What is the choice of being answer c?

6 0
4 years ago
Therapeutic services pays less than most other careers.<br><br><br> 1) True<br> 2) False
horrorfan [7]

This is false. Therapeutic services are some of the most expensive.

6 0
3 years ago
Read 2 more answers
Which website is important for hacking
Yuliya22 [10]

Answer:

Here's a few

Explanation:

  • SQL Injection attacks. SQL Injection attack is the most common website hacking technique. ...
  • Cross Site Scripting (XSS) ...
  • Denial of Service (DoS/DDoS) ...
  • Cross-site request forgery (CSRF or XSRF) ...
  • DNS Spoofing (DNS cache poisoning) ...
  • Social engineering techniques.

Glad I could help!!

6 0
3 years ago
Other questions:
  • The__ key is used to group or identify a field or record within a table. (you don't need it).
    5·2 answers
  • The domain name service (dns is a distributed database that allows users to communicate with each other computers by:
    7·1 answer
  • Assume that an array of integers named a that contains exactly five elements has been declared and initialized. Write a single s
    15·1 answer
  • Use of multimedia in business sector...​?
    5·1 answer
  • When adopting the use of social media in emergency management, it is important to have
    10·1 answer
  • An ip address in the address range 169.254.x.y, used by a computer when it cannot successfully lease an ip address from a dhcp s
    6·1 answer
  • A programmer has an idea to use just one language for the content, structure, and style of web pages. What might be a problem wi
    11·1 answer
  • What is one way to process your thoughts about the information you are reading?
    15·1 answer
  • This computer is used by touching your finger.
    14·1 answer
  • How many different four-letter combinations for a locker password can you make with the lowercase and uppercase forms of the fir
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!