1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivan
3 years ago
13

Which type babshshshhsshshhshshshhshs

Computers and Technology
1 answer:
Westkost [7]3 years ago
8 0
The answer would be c
You might be interested in
​In sql server, the cursor property ____________________ means that the cursor is used for retrieval purposes only.
enyata [817]
I have recently found this answer https://assignment.essayshark.com/blog/sql-simple-examples-database/. Then provided me with a ready assignment in a very short period of time.

5 0
3 years ago
What is application software used for
topjm [15]

Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets. A word processor could be classed as general purpose software as it would allow a user to write a novel, create a restaurant menu or even make a poster.

8 0
3 years ago
What is the name of a button on a website?
zhuklara [117]
May I know which button?
5 0
3 years ago
What happen if ignore the unsafe markings in hand tools in ict​
Snowcat [4.5K]

Answer:

Getting it right will not only protect employees and visitors from harm, it will also help to create a safe, productive workplace and mean that businesses can avoid any unnecessary financial loss.

4 0
2 years ago
Data files whose records are always retrieved in sequence from the beginning of the file are known as
dimaraw [331]

Answer:

sequential files

Explanation:

Q:

Data files whose records are always retrieved in sequence from the beginning of the file are

A:

sequential files

3 0
2 years ago
Other questions:
  • Design and document an IP addressing scheme to meet ElectroMyCycle’s needs. Specify which IP address blocks will be assigned to
    11·1 answer
  • Design an algorithm for a bounded-buffer monitor in which the buffers (portions) are embedded within the monitor itself."
    10·1 answer
  • How will using ascending order on a field that contains dates sort a list?
    12·2 answers
  • Marissa, a 21-year-old young woman, is working as an intern at a software company. She has recently graduated from college. She
    6·1 answer
  • Write a method that accepts a string as an argument and checks it for proper capitalization and punctuation. The method should d
    14·1 answer
  • What is the best stratiget to avoid paying intrest in your credit cared
    13·1 answer
  • An example of computer hardware is ? A. keyboard B. app C. web browser D. operating system
    13·2 answers
  • What is multimedia hard ware? Write any four examples of multimedia hardware. <br>​
    13·1 answer
  • After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
    13·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!