1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tju [1.3M]
3 years ago
12

What is a database query?

Computers and Technology
2 answers:
lana [24]3 years ago
8 0
C.a form used to create a new tables for the database
adelina 88 [10]3 years ago
8 0

Answer:

a search for data that matches given parameters

Explanation:

APEX Verified

You might be interested in
Identify an advantage of centralized processing
lara [203]

Answer:

In a centralized organization structure, the centralized authority may have a better perspective on the big picture of the organization and how the subunits of the organization fit together and this may make centralized authority optimal.

Please mark brainliest, hope this helped :)

7 0
3 years ago
Activity Guide - Using the Problem Solving Process answer key anyone got it ?
KonstantinChe [14]

Answer:

phenis

Explanation:

because women love phenis and i like when my phenis in woman viagina

7 0
3 years ago
Network does not provide security to us​
Zinaida [17]

Answer:

<u>May this answer be helpful for you </u>

Explanation:

<u>1.False. </u>

<u>1.False. 2.Network security has many policies which ensure the secure surfing of the internet. </u>

<u>1.False. 2.Network security has many policies which ensure the secure surfing of the internet. 3.The policies do not allow unauthorized access. 4.Thus, network does provide security to us.</u>

3 0
3 years ago
What technique may be performed by boundary devices that include proxy server capabilities to replace private IP addresses with
ANEK [815]

Answer

Address masquerading technique.

Explanation:

Address masquerading

8 0
4 years ago
Which of the following does NOT describe word processing?
GarryVolchara [31]

Answer:

Editing graphics

Explanation:

I looked it up (at least I was honest)

3 0
3 years ago
Read 2 more answers
Other questions:
  • If you are driving at night, you should not use high-beam headlights within _________ of oncoming vehicles. Florida Road Rules 4
    9·2 answers
  • Technology is often discovered by accident
    5·1 answer
  • What are the features of a strong résumé? Check all that apply. The résumé is printed on regular printer paper. The résumé is we
    5·2 answers
  • What best describes "broadband access"? a. broadband access is a specific term used to describe the delivery of one-way televisi
    5·1 answer
  • Which of the following are efficient ways to use the Internet? Check all of the boxes that apply.
    12·2 answers
  • Done through Block Py/ Python
    11·1 answer
  • Which of the following is the best reason to use a macro?: *
    14·1 answer
  • Which is a solution that represents the majority of VPNs on the market and is commonly referred to as a VPN appliance?
    13·1 answer
  • What does Boot Partition mean?
    7·1 answer
  • 0.0% complete question a forensics analyst is attempting a live acquisition of the contents of the memory of a running linux dev
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!