1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
4 years ago
8

It is important that data being imported from a text file into access are separated by a character, such as a comma, which defin

es the text file as a(n ____ text file.
Computers and Technology
1 answer:
MrRissso [65]4 years ago
3 0
Ur answer is Delimited hope this helps!
You might be interested in
How do you access the dark web? What are the negatives of doing this?
Inessa05 [86]
The dark web is illegal and therefore people can hack you, obtain your information (identity theft) etc.
6 0
3 years ago
Virtual Memory involves swapping between which 2 devices?
Darina [25.2K]

Answer:

Ram and the hard drive

Explanation:

A page of RAM is written to the harddisk and read back when it is needed again. That way it may seem you have more RAM than you actually have, at the cost of performance of course.

6 0
3 years ago
What are some catchy names for computer basics that you would put on a childrens poster?
Triss [41]

Answer:

not sure

Explanation:

6 0
3 years ago
vertical exchanges are typically used only to buy and sell materials required for an organization's support activities ( True or
torisob [31]

Answer:

Vertical exchanges are typically used only to buy and sell materials required for an organization's support activities- False

7 0
3 years ago
Read 2 more answers
What are some games you have played on the internet? Give atleast two. (Some computer come up with games allready on them where
Nadusha1986 [10]

Answer:

Geometry Dash and Slope Unblocked are my favorites.

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Programmers say the data items are ____ only within the module in which they are declared.
    5·1 answer
  • Sizing handles are used in Microsoft® Word® to _____.
    13·1 answer
  • Calculate the shear stress (lbf/in^2) for a given normal stress (lbf/in^2) that is applied to a material with a given cohesion (
    15·1 answer
  • Why isn't my brainly camera working? I got Brainly Plus and can't even scan questions. I've logged out, I've uninstalled and rei
    14·1 answer
  • Can somebody please halp meeee?? I'm doing Web design.
    12·2 answers
  • Explain how the operating system controls the software and hardware on the computer?
    5·1 answer
  • Which among the following shortcut key is used to check spelling​
    12·2 answers
  • Question 4 (7 points)
    6·1 answer
  • 1. As part of your community, your school, and your neighbourhood, how else does ICT have an impact on social
    11·1 answer
  • The top-level domain (tld), also known as the ________, typically identifies the type of organization an address is associated w
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!