1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
N76 [4]
3 years ago
10

- Truncate command response time is ______ as comparedto Delete command.

Computers and Technology
1 answer:
MArishka [77]3 years ago
8 0

Answer:

c. Better

Explanation:

Truncate command response time is better as compared to Delete command.

You might be interested in
Bob works in a small office with a network of computers. Bob, along with all the other employees, is responsible for securing hi
miskamm [114]

Answer:

False

Explanation:

When an employee becomes the one responsible for the security of His own computer then the scenario does not define Network security. Network security is a usage of hardware and related software to provide protection to the underlying network architecture from unauthorized access and other anomalies related to networks.

5 0
3 years ago
If you're unsure of what chart to use for a set of data, what feature does Excel include that will help you to decide? A. Sparkl
asambeis [7]
If what I found is correct it would be C, all charts... If not that then it would be B.
6 0
3 years ago
Read 2 more answers
Does anyone know how to snip or like screenshot the screen?
Rashid [163]

Answer:

yes it is on pc shift command 3

Explanation:

thats how i do it

8 0
3 years ago
Which of these is not a feature of a CPU?<br><br>Multicore<br>64-Bit Processing<br>L1 Cache<br>DDR
Triss [41]

Answer:

DDR

Explanation:

DDR is a feature of memory. It means a double data rate and is a more sophisticated version of the SDRAM, which is a memory. And the rest like the Multicore, 64-bit processing, and the L1 cache are the features of the CPU. And hence, the correct option here is none other than DDR. Remember that the L1 cache is the memory bank, which is being built over the CPU chip. And we have 32 bit and 64-bit processing for the CPU. As well as CPU can be dual-core, quad-core and likewise.

4 0
3 years ago
Read 2 more answers
Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output tho
cupoosta [38]

Answer:

Following are the program in java language:

import java.util.*; // import package

public class Main

{

public static void main(String[] args) // main method

{

 int num; // integer variable declaration

 double r; //double varaible declaration

 char ch; // char variable declaration

Scanner scnr=new Scanner(System.in); // creating the instance of scanner

 System.out.println("Enter the string:");

 String str=scnr.nextLine(); // reda string by user

System.out.println("Enter the integer value:");

 num=scnr.nextInt(); // Read integer value by the user

 System.out.println("Enter the Double value:");

 r=scnr.nextDouble(); // read double value by user

 System.out.println("Enter the character value:");

 ch= scnr.next().charAt(0); // read character by user

 System.out.print(num + " ,"); // display them in a single line

 System.out.print( " " +r +" ,");//dislpay in a single line  

  System.out.print( " " +ch +",");//dislpay in a single line

 System.out.print(" " +str);//dislpay in a single line

}

}

Output:

Enter the string:

ram

Enter the integer value:

34

Enter the Double value:

45.789

Enter the character value:

r

34 , 45.789 , r, ram

Explanation:

Following are the description of program

  • Read the integer ,string,char,double value by the user by using scanner class in "num","str","ch" and "r" variable respectively
  • Print that value in a single line separated by comma by System.out.println statement.

7 0
3 years ago
Other questions:
  • The _________ contains frequently used formatting commands that are displayed when selecting text or objects with the mouse.
    7·1 answer
  • Which answer choice correctly distinguishes among the three pieces of data?
    13·1 answer
  • When you copy a formula that contains an absolute reference to a new location, the reference ____. a. has a dotted outline in it
    6·1 answer
  • ________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
    14·1 answer
  • What is the point of brainy when other people have to answer your questions but not the cumputer
    9·1 answer
  • PYTHON Write a grade program using a function called computegrade that takes a score as its parameter and return a grade as a st
    8·1 answer
  • You can place an insertion point by clicking in the field or by pressing ____.
    13·1 answer
  • ¿porque y como surge la informatica y las computadoras
    13·1 answer
  • What is the best description of a programming language?
    15·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!