1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
3 years ago
14

kieran wants to search a database quickly for information on the last time a patient came to his medical facility.The informatio

n is contained in one table.which feature would make the most sense for him use
Computers and Technology
2 answers:
anygoal [31]3 years ago
8 0

Answer:

Sort

Explanation:

Anna11 [10]3 years ago
4 0

if he presses f3 it will pull up the find bar (this is for Dell

You might be interested in
Help guys thank you =) ​
MrRissso [65]
1.LR
2.LR
3.HR
4.LR
5.HR
6 0
3 years ago
Which of the following is NOT an algorithm?
Nata [24]

Answer:

d) rolling a pair of dice in monopoly

Explanation:

an algorithm is a process or set of rules followed in a particular order to perform a certain task. all of the other answers are a set of instructions that lead to something except for rolling a pair of dice. rolling a pair of dice can be a part of instruction but its not a process in itself.

hope this makes sense!

3 0
3 years ago
How many pounds must a sand bag weigh to test if a safety net can absorb the proper amount of force? A. 150 lbs. B. 200 lbs. C.
Ymorist [56]
C. is your answer have a nice day
7 0
3 years ago
Read 2 more answers
1) Design a class named Axolotl that holds attributes for an axolotl's name, weight, and color. Include methods to set and get e
crimeas [40]

what subject is this exactly?

5 0
3 years ago
An independent computer program that copies itself from one computer to another over a network is called a ____:
Komok [63]
The answer is trojan horse.
4 0
3 years ago
Other questions:
  • In one or more complete sentences, explain about vehicle maintenance and vehicle safety
    12·2 answers
  • Which program can damage your computer
    13·2 answers
  • Every character is represented by a code. The ASCII code for upper letter A is 65 and for lower a is 97. Similarly the numeric c
    9·1 answer
  • After you enter the details for the first selected recipient in the New Address List dialog box, click _______ to add another re
    9·1 answer
  • Which of the following is not a concern that has come out of the widespread adoption of the Internet?
    7·1 answer
  • Which is an example of an incremental approach to solving a problem?
    15·1 answer
  • A(n) ________ collects data from various key business processes and stores the data in a single comprehensive data repository, u
    11·1 answer
  • Harrison works in a manufacturing unit and oversees the logistics, including the daily shipping of a large number of packages. W
    12·2 answers
  • In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
    12·1 answer
  • A Chain of dry-cleaning outlets wants to improve its operations by using data from devices at individual locations to make real-
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!