1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
4 years ago
12

To see all of the records at once, you should use _______ view. 

Computers and Technology
2 answers:
Helga [31]4 years ago
7 0
D.Table (computer tech is hard)
OverLord2011 [107]4 years ago
4 0
D. Table I hope this helps
You might be interested in
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
Characteristics of at-risk drivers
Firlakuza [10]
An at-risk driver is someone who is recklessly driving. an at-risk driver is a driver who is driving at a very high rate of speed. an at-risk driver is a driver who is someone who is driving in dangerous way as in no seatbelt or being distracted. 
4 0
3 years ago
Read 2 more answers
What permissions are needed in order to use a work online that is in the public domain?
Maurinko [17]
<h2 /><h2>⇒Written  \: permission  \: from \\  the  \: creator</h2>

The term “public domain” refers to creative materials that are not protected by intellectual property laws such as copyright, trademark, or patent laws. ... Anyone can use a public domain work without obtaining permission, but no one can ever own it.

5 0
3 years ago
Why do people still use Intel HD graphics for gaming?
pogonyaev
People usually do that because they can't afford a gpu or because they don't know anything about a gpu.
8 0
3 years ago
Establishing a telephone call would be impossible without signaling.<br><br> True or False
musickatia [10]

Answer:  True.

Explanation:

When a user wants to make a phone call, he needs to inform to the called party, that he wants to call him.

The only way to do this, is setting up a connection between the two phones, which is started by the calling party informing to the phone switch which is directly connected to, that he wants to make a call, picking up the phone, which modifies his connection state, making him available for calling.

The switch then signals him (sending him an audible call tone) so he can send the digits that identify the called party.

When the destination switch identifies the called user, signals him also (sending in this case a ringing tone).

When he picks up his phone, answering  the call, the connection is set up, and both people can talk each other.

Without all this signaling process, it would be completely impossible to set up the call.

6 0
3 years ago
Other questions:
  • The variable sentence stores a string. Write code to determine how many words in sentence start and end with the same letter, in
    13·1 answer
  • After reviewing the various types of network connections available, a client chooses a network connection that is considered to
    13·1 answer
  • A person who has a been exposed to technology at a young age is?
    8·1 answer
  • What is the wave speed of a wave that has a frequency of 100 Hz and a wavelength of 0.30m?
    5·1 answer
  • Which of the following tasks would you most likely use a spreadsheet to complete
    15·1 answer
  • . Write a code to define a linked list node using the above defined structure student (i.e. the data of the node is a student st
    11·1 answer
  • A(n) ____ occurs when a situation results in service disruptions for weeks or months, requiring a government to declare a state
    6·1 answer
  • What does digital mean, in the term of computer science.
    11·1 answer
  • Explain the function of different flags in the 8086<br>​
    12·1 answer
  • Write a program to enter 30 integer numbers into an array and display​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!