1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
3 years ago
6

When listing columns in the select list, what should you use to separate the columns?

Computers and Technology
1 answer:
Gala2k [10]3 years ago
6 0
The answer is commas.  <span>When listing columns in the select list, commas should be used to separate the columns.</span>
You might be interested in
Kevin wants an application that will help him create a website as well as publish it. What application can he use?
AURORKA [14]

Answer:

D

Explanation:

Adobe Dreamweaver can hep him make a website and publish it.

3 0
3 years ago
Which option best explains the goal of computer science?
skad [1K]

Answer:

B correct answer b i think so

8 0
3 years ago
A network technician cannot get a host to connect to the internet. running the ping command shows the apipa ip address. what is
Lunna [17]
The router will not connect to th network. This will keep it from connecting to the NEXUS
6 0
3 years ago
Match each term with the statement that best describes it.
chubhunter [2.5K]

Answer:

Field: A placeholder for information that changes

Explanation:

The are on the page where we write our information. Each page consist of field area where we write text, insert figures and tables.

Table: A grid of columns and rows that you can fill with text and graphics

Explanation:

The arrangement of row and columns to organize the information for the purpose of analyzing and comparing is called Table.

Section break: A formatting mark that divides a document into parts that can be formatted

Explanation:

If we want to divide the document in terms of formatting, we apply section breaks in the document. e.g. If we are writing a document in landscape mode and want to insert few pages in portrait mode then we apply section break.

Header: Text or graphics that appear at the top of every page in a document

Explanation:

The place at the top of the page, where we want to insert some text that should be fixed on each page such as page number, chapter name or book name. We use header.

Manual page break  of the next page: A formatting mark that forces the text following the mark to begin at the top

Explanation:

If we complete the working on one page and want to start work on new page. we apply page break so that any change in formatting of the previous page could not affect the new page.

Footer:Text or graphics that appear at the bottom of every page in a document

Explanation:

The place at the bottom of the page, where we want to insert some text that should be fixed on each page such as page number.

Bibliography: A list of the sources used to create a document

Explanation:

The list of sources that we use to complete our document, from we read some literature to support our arguments. It has been added at the end of the document.

Citation:  A parenthetical reference in the document text that gives credit to a source

Explanation:

The information that we read from other document and insert in our document, assign it a reference to insert in bibliography section.

Margin: The blank area between the edge of the text and the edge of the page

Explanation:

The space between text and edges of the the page from top, bottom, left and right side is called margin.

6 0
3 years ago
To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to
ioda

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Jeremy, a college student, is preparing to give a speech on "Social Responsibilities." He refers to a Web page on a tab using
    10·1 answer
  • Which one of the following is a functional requirement? Select one: a. None of the mentioned b. Robustness c. Maintainability d.
    10·1 answer
  • You are working on an excel table and realize that you need to add a row to the middle of your table. what is one way to do this
    12·1 answer
  • Select all the correct answers. Which two statements are true about an OS? translates the user's instructions into binary to get
    10·1 answer
  • Lifelong learning _____. is only important for professionals with advanced degrees can be formal or informal includes formal cla
    12·1 answer
  • The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. For ma
    10·1 answer
  • About how long did it take to photograph Daguerre's photograph of the street?
    7·1 answer
  • Which procedure is recommended when cleaning inside a computer? Clean the hard drive heads with a cotton swab. Hold the CPU fan
    9·1 answer
  • SOLVE IN C:
    10·1 answer
  • 8.7 Code Practice: Question 2 edhesive
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!