1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
3 years ago
12

After a user creates a new query or edits an existing query they must ________ the query to display the corresponding results.

Computers and Technology
1 answer:
kow [346]3 years ago
5 0

It maybe they must run the query to display the corresponding results.

You might be interested in
The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
Rudiy27

Answer:

True

Explanation:

Computer security is basically divided into three main areas:

  1. Vulnerability/threat assessment and risk management refers to a process that requires the identification, quantification and ranking of a system's possible vulnerabilities.
  2. network intrusion detection and incident response refers to software that detects malicious activity or policy violations, and blocks them
  3. digital forensic investigation refers to the process of identifying, recovering and interpreting (or validating) electronic data.

Generally a single individual may specialize in one of these areas, that is why he/she may need help with the others.

8 0
4 years ago
Read 2 more answers
Methods are used to define an object's behavior. True False
pishuonlain [190]

Answer: True

Explanation:

 Yes, the given statement is true that the methods are use to define an object behavior. As, methods are basically a procedure which are associated with the an object, where an object are the combination of functions and variable.

An object is basically consist of behavior and data in which the data are used to represent the properties of an object and the behavior are used to represent the methods of an object.

Methods maintain the interface for modifying the properties of data in an object.

4 0
4 years ago
Type the correct answer in the box. Spell all words correctly.
marissa [1.9K]

Answer:

GIF

Explanation:

The Graphic Interchange Format (GIF) is the image format that supports small animations made out of sequential frames played in sequence and possibly in loops, depending on the parameters saved in the file.

The Animated GIFs are seen everywhere these days on social medias, where people use them to express their emotions in bigger and  more elaborate ways then emoticons.

6 0
4 years ago
A list of steps to finish a task. A set of instructions that can be performed with or without a computer is called an
fomenos

Answer:

algorithm

Explanation:

4 0
3 years ago
BRAINLIEST 14 points
lana [24]

Answer:

the first four options

Explanation:

they make the most sense

8 0
3 years ago
Read 2 more answers
Other questions:
  • Race conditions are possible in many computer systems. Consider a banking system with two methods: deposit(amount) and withdraw(
    14·1 answer
  • If memory accesses take 100 times more than register accesses, then a LOAD instruction will take ___ machine cycles than an ADD
    7·1 answer
  • Why wont my brainly account rank up even tho i have 1193 points and 5/5 brainly trophies but it still wont rank me up to vistro
    11·2 answers
  • What kinds of variables are accessible from outside of the class?
    8·1 answer
  • Before his job interview, Shabnam took the time to carefully wash and iron his best khaki pants and a button-down shirt. He even
    15·2 answers
  • In many programming environments today, one language translates the programmers' code into a different language before the compu
    6·1 answer
  • Fortnight on sat 530-10 my name is TTV BTW laggking_12
    5·1 answer
  • Topic: Video Games
    15·1 answer
  • How can you create a messages to look like an IMessage?
    8·1 answer
  • Universal containers wants internal support requests to be directed to any of the IT reps. They want external support requests t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!