1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Deffense [45]
3 years ago
10

A(n) _____ evaluates a specified data set and returns certain fields from that data set as instructed.

Computers and Technology
2 answers:
Natalka [10]3 years ago
6 0

Answer:

The correct option of the following question is A.) query.

Explanation:

A query is the request for the information or the data from the database tables or the combination of the tables. This data may generated as the results that returned by the SQL (Structured Query Language) or as the pictorials, complex results or graphs, e.g., it trend analyses from the data-mining tools.

A query either be the request for the data results from the database or for the action on data, or both.

elena55 [62]3 years ago
5 0

The correct answer is Query

You might be interested in
Which process could you use to add a table to a document?
Lady_Fox [76]
These are the steps you would take..

click on insert at the bar on the top of the document  processor (Word,Google Docs ect.) >>Click table drag as many columns and rows as you need!
I hope this helps!
6 0
3 years ago
What's the biggest security issue with using social networking sites to market your listings?
Savatey [412]

The biggest security issue with using social networking sites to market your listings is Criminals may use social networking sites to identify your personal data.

<h3>What is a social marketing site?</h3>

A social marketing site is a site where people from around the world are connected in one place and share their thoughts and photos and other data.

The social sites are on the internet and there is a chance of stealing data and it identity theft, phishing, online predators, internet fraud, and other cybercriminal attacks are also some risks.

Thus, the largest security concern with using social networking sites to sell your listings is that thieves could use these sites to find personal information about you.

To learn more about social marketing sites, refer to the link:

brainly.com/question/15051868

#SPJ4

6 0
1 year ago
Please tell fast plzzzzzz.​
lana [24]

Answer:

True

Explanation:

4 0
2 years ago
Which of the following is an example of how the healthcare industry uses computer programming? (5 points)
IgorC [24]
3-D prosthetics would most likely be the answer, also, don’t copy links it’s most likely not the answer anyways.
5 0
2 years ago
Your company shares a building with a competitor's branch office. Recently, you noticed that some computers other than company c
professor190 [17]

<u>The wireless network:</u>

Wireless networking and internet access are essentials when it comes to the smooth functioning of an enterprise. Certain information can be transferred from one computer to another within a specified if they are connected to a network.

In this case, as the company shares the building with the branch office of a rival company there may be repercussions. First of all, the company's wireless network should be equipped with a strong password and it should be changed regularly too.

Next, the officials responsible for networking should also monitor the range of their wireless network. There is no point in keeping the range of wireless network wide as it is to be used by employees only and they can access it on the company's premises.

5 0
3 years ago
Other questions:
  • Whats the difference between copying a file to my desktop and creating a shortcut?
    8·1 answer
  • An identifier that is prefixed with an @ and allows you to use code written in other languages that do not have the same set of
    8·1 answer
  • Who distributes IP Address?
    10·1 answer
  • Match the job description to the level of degree it requires.
    15·1 answer
  • ______ is a customer-facing CRM application.<br><br> FAQ<br><br> Search<br><br> SFA<br><br> E-mail
    6·1 answer
  • An understanding of basic psychology can help design and marketing teams ensure they meet their intended audience.
    15·2 answers
  • 1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up tim
    7·1 answer
  • Explain the concept of “survival of the fittest”
    15·1 answer
  • The development of online capabilities created the ________, an information- and communication-based electronic exchange environ
    15·1 answer
  • Calculate the time complexity for the following function in terms of Big O notation. Explain your answer.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!