1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
4 years ago
9

Ron wants to keep track of his client's information.

Computers and Technology
1 answer:
Snezhnost [94]4 years ago
7 0
The answer is Database assuming those are the answer choices

You might be interested in
Select all that apply
My name is Ann [436]

Answer:

social change and cultural change i hope this help you

8 0
3 years ago
Which command should you select to delete a comment?
Nana76 [90]
This completely depends on what command shell/program you are using
4 0
3 years ago
Read 2 more answers
What automatically created subdomain holds all the SRV records for Microsoft-hosted services, such as the global catalog, LDAP,
nevsk [136]

Answer:

The correct answer to the following question will be "_msdcs".

Explanation:

Msdcs directory known as Microsoft Domain Controller Catalog requires SRV documents that are used to identify domain controller for certain operations.

  • It automatically generated subdomain keeps all Microsoft-hosted resources SRV data, so it's the correct answer.
  • It includes common SRV documents, documents of LDAP, documents of Kpass, CNAME, etc.
7 0
4 years ago
Which column and row references are updated when you copy the formula =$A1+B$10 Select all that apply.
lora16 [44]

Answer:

c

Explanation:

4 0
3 years ago
Read 2 more answers
The ____ loop can be used to process each element of an array.?
salantis [7]
The "For each" loop can be used to process each element of an array.?
4 0
3 years ago
Other questions:
  • What type of mitigation provision is utilized when redundant communications links are installed?
    8·1 answer
  • I can't see the answer
    13·2 answers
  • Three healthcare firms jointly own and share the same cloud resources to meet their computing needs. Which cloud model does this
    15·1 answer
  • Liam is a hacker who tries to access Wi-Fi signals while driving his car. What type of wireless network attack is this?
    9·1 answer
  • I'm not so good with games and stuff. So, PLZZZ help!!!
    7·2 answers
  • How did Avery and Garth most likely create their
    13·1 answer
  • What would be the greatest tool for emphasis? (video class)
    9·1 answer
  • Hi I'm new here can everyone add me as frein ​
    8·1 answer
  • What is the process of ensuring that corporate security policies are carried out<br> consistently?
    6·1 answer
  • based on your completed tables for ping requests and replies, which field do you think helps the network identify the appropriat
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!