1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
14

A ___describes a particular attribute of the dates item in a table​

Computers and Technology
1 answer:
Vikentia [17]3 years ago
5 0

Answer:

\huge\star{\underline{\mathtt{\red{A}\red{n}\red{s}\red{w}\red{e}\red{r}}}}\huge\star

.

<h3><em>A</em><em><u> objective</u></em><em><u> </u></em><em><u>of</u></em><em><u> technique</u></em><em> </em><em>describes a particular attribute of the dates item in a table</em><em>.</em></h3>

<em>.</em>

<em>I </em><em>hope</em><em> </em><em>this</em><em> </em><em>helps</em><em> </em><em>you</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em>

You might be interested in
Icon view, list view, and details view are all common views provided by which kind of program?
cupoosta [38]

Answer: The standard program that uses common views such as the icon view, list view, and details view would be the program known as "File Explorer" (Windows) or "Finder" (Mac). This program uses all the views to make selecting and tracking down certain files a much more painless and easier process to complete.

Explanation:

boom : )

4 0
3 years ago
Read 2 more answers
What is the encryption cipher that was the precursor to des??
Elanso [62]
DES works by using the same key to encrypt and decrypt a message, so both the sender and the receiver must know and use the same private key. Once the go-to, symmetric-key algorithm for the encryption of electronic data, DES has been superseded by the more secure Advanced Encryption Standard (AES) algorithm.
8 0
3 years ago
What happens when two computers use the same IP address?
mr Goodwill [35]

Answer:

Its B, "irregular signals sent over the network"

Explanation:

When you duplicate IP addresses don’t make one machine controllable but they rather just <em><u>break</u></em><u><em> network connectivity.</em></u>

<u><em /></u>

<u><em>HOPPPPE THIS HELPPPPPPPPPPPPSS</em></u>

7 0
3 years ago
You can apply several different worksheet themes from which tab?
Nookie1986 [14]

page layout...... im not sure

6 0
3 years ago
Read 2 more answers
Here is what my rob-lox user USED to look like, btw what is better, Samsung or apple?
____ [38]
Apple is better then Samsung
6 0
2 years ago
Read 2 more answers
Other questions:
  • "what are the problems with tcp over wireless network?"
    15·1 answer
  • When activated, an Excel object has all the features of an Excel
    8·2 answers
  • A beginning driver may tend to oversteer. This means the driver what? Btw Cars are technology so that is why it is under Compute
    11·1 answer
  • A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for
    10·1 answer
  • 3. Before you get ready to go diving, you want to explore the area. You see a small snowpack across a small bridge, a short walk
    11·1 answer
  • Communications technology and the Internet can be used to reduce the time and costs involved in disseminating financial statemen
    14·1 answer
  • Which practice is the safest way to sit at a desk while typing on the computer?
    12·1 answer
  • Imagine that you have access to a class named MyCircle that has void setRadius(double r) and double getRadius() methods. Write a
    14·1 answer
  • Put these numbers in order from smallest to largest:<br> 1. 00101112<br> 2. 011110<br> 3. 011110112
    12·2 answers
  • Ryan would like to copy a list of contacts from a colleague into his personal address book. The list of contacts is contained in
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!