1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
3 years ago
8

Pls help!!!!!!!!!!!!

Computers and Technology
1 answer:
son4ous [18]3 years ago
5 0

Answer:

i am 100% sure it is (B)

Explanation:

To delete offensive or irrelevant posts  

You might be interested in
If any one has mincraft on ps4 bedrock we can finish building a BIG city world all we need to put is a shop and money dispensers
sasho [114]

Answer:

Cool

Explanation:

7 0
3 years ago
Read 2 more answers
If you anticipate running a particular query often, you can improve overall performance by saving the query in a special file ca
mestny [16]

If you anticipate running a particular query often, you can improve overall performance by saving the query in a special file called a(n)  stored procedure.

<h3>What is meant by stored procedure?</h3>

An application that uses a relational database management system can access a subroutine known as a stored procedure. These processes are kept in the data dictionary of the database. Access control and data validation are two applications for stored processes.

A stored procedure is a collection of SQL statements that have been given a name and are kept together in a relational database management system (RDBMS) so they may be used and shared by various programs.

If you expect to run a certain query frequently, putting it in a special file known as a(n) stored procedure can enhance overall speed.

To learn more about stored procedure refer to:

brainly.com/question/13692678

#SPJ4

3 0
1 year ago
Why did latex replace wax?
andrezito [222]

Answer:

Latex replaced wax because it did the same thing and was used for the same things that wax would be used for

Explanation:

3 0
3 years ago
No production Web application, whether it resides inside or outside of the firewall, should be implemented without:
Alona [7]

Answer:

Stay ahead of threats with machine learning-based WAF protection! Learn more today. Integrate application security and application delivery to protect your network. 100% Privacy. Keep Costs Down. Business Continuity. Maximum Productivity. Types: DDoS Protection

WELCOME

5 0
3 years ago
What are the three general methods for delivering content from a server to a client across a network
Tju [1.3M]

Answer:

Answered below.

Explanation:

The three general methods consist of unicasting, broadcasting and multicasting.

Casting implies the transfer of data from one computer (sender) to another (recipient).

Unicasting is the transfer of data from a single sender to a single recipient.

Broadcasting deals with the transfer of data from one sender to many recipients.

Multicasting defines the transfer of data from more than one sender to more than one recipients.

8 0
2 years ago
Other questions:
  • Look at the slide. How could the slide best be improved? By reducing the number of visual aids by increasing the font size by da
    8·2 answers
  • Whos ready for sao ordinal scale this march!!!( ಥـْـِـِـِـْಥ)
    7·1 answer
  • In the software development life cycle, what is the role of participants in the planning phase? The participants’ role in the pl
    6·1 answer
  • Class CTRivers describes collection of CT rivers. It has no data, and it provides the following service methods. None of the met
    13·1 answer
  • C++
    11·2 answers
  • Write a Comparator that compares String objects by the number of words they contain. Consider any nonwhitespace string of charac
    15·1 answer
  • An image that has been saved in Tagged Image File Format (or .TIF) is A. readable only by Windows personal computers. B. a recto
    6·1 answer
  • What would be a social networking page background for Sigmund Freud?
    15·1 answer
  • Consider the following implementation of a search method:
    13·2 answers
  • Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!