1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
15

If you're doing a relational comparison, which filter would be available?

Computers and Technology
1 answer:
taurus [48]3 years ago
7 0

Answer:

C. Number

Explanation:

If you're doing a relational comparison, a number filter would be available.

You might be interested in
Bakit mahalaga na marunong tayong gumamit ng makina?
jeka94

Answer:

para mabilis ang gawa

Explanation:

hope it helps

5 0
3 years ago
When a customer makes an online hotel booking the database is updated by using
Valentin [98]
I think it’s a form,if wrong please don’t be mad
4 0
3 years ago
Read 2 more answers
Where you should go to find out what access the system and users to a file ​
dsp73

Answer:

To see who reads the file, open “Windows Event Viewer”, and navigate to “Windows Logs” → “Security”. There is a “Filter Current Log” option in the right pane to find the relevant events. If anyone opens the file, event ID 4656 and 4663 will be logged.

4 0
3 years ago
What is the difference between a function with parameters, and a function<br> without parameters? *
Romashka [77]

Answer:

A function with out parameters cannot take any arguments or perform operations on variables passed in. A function with parameters can.

8 0
2 years ago
Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require
4vir4ik [10]

Answer:

packet filtering

Explanation:

We can use a packet filtering firewall, for something like this, reasons because when visiting a site these types of firewalls should block all incoming traffic and analyze each packet, before sending it to the user. So if the packet is coming from a malicious origin, we can then drop that packet and be on our day ;D

7 0
4 years ago
Other questions:
  • Listed items that are not in any particular order should be identified with _____.
    9·1 answer
  • Create a view named ItemOrder view. It consists of the TaskID, description, price, order number, order date, and quoted price fo
    8·1 answer
  • Which is an example of correct HTML?
    10·1 answer
  • When a workforce scheduling problems is formulated as an integer programming model, it has:?
    6·1 answer
  • Wide area network (WAN) connects multiple networks that are in the same geographical locations.
    6·1 answer
  • so i just went to play forge of empires and when i logged on to it all of my progress was gone and i was so far in to it
    15·2 answers
  • To cope with the uncertainty about how their pages will be viewed, many web page designers opt to use _________ units, which are
    13·1 answer
  • If someone you don’t know asks where you go to school, what should you do
    12·1 answer
  • Please answer quickly :S
    7·2 answers
  • How does the dns help the world wide web scale so that billions of users can access billions of web pages?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!