1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korolek [52]
3 years ago
13

Fill in the blank

Computers and Technology
2 answers:
EastWind [94]3 years ago
7 0

Answer:

It is called the ENQUIRE database

Explanation: got it right boooiiiii

vivado [14]3 years ago
6 0

Answer:

the ENQUIRE database

Explanation:

it was the processor for the world wide web, It was a simple hypertext program.

You might be interested in
A computer _________________ is a text file that a computer can understand
Gekata [30.6K]

Answer:

A computer ___Task__ is a text file that a computer can understand

6 0
2 years ago
What is cryptocurrency ? I need to do a research one it please help!
icang [17]

A cryptocurrency is a digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions, control the creation of additional units, and verify the transfer of assets.

8 0
3 years ago
HELPPPPPPPP
Reika [66]
The answer is visual hierarchy :)
4 0
3 years ago
Read 2 more answers
The power on any voltage rail of the hard drive is calculated by multiplying _____. (a). Voltage X Current (b). Voltage X Watts
Papessa [141]

Answer:

(a). Voltage X Current

Explanation:

Power -

In the concept of physics , power is denoted by P ,

Power = Voltage * Current

Power = V * I

The unit is Ampere  *  Voltage

Power is defined as the rate of work done , i.e. , work divided by time .

Power = work / time .

Power is a scalar quantity .

The standard unit of power is Watt , which is denoted by W .

6 0
3 years ago
What are the three different categories of the types of rule ?
slamgirl [31]
Depends on what rules your talking about
3 0
2 years ago
Other questions:
  • Maintenance is an essential task that is often considered to be dull. In information security, penetration testing may be wrongl
    12·1 answer
  • A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
    11·1 answer
  • Is this photo considered rim photography
    11·1 answer
  • Describe how antipoverty programs can discourage the poor from working. How might you reduce this disincentive? What are the dis
    11·1 answer
  • What is a recent technological breakthrough with an impact that can be compared to the invention of paper nearly 2,000 years ago
    8·1 answer
  • Help me match these answers
    5·1 answer
  • Which steps will create a new blank word document
    9·1 answer
  • O O O O O O O
    9·1 answer
  • Select the four bad password ideas.
    13·2 answers
  • Which of the following was most likely used to apply red background and font to some of the cells in column D?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!