1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga2289 [7]
3 years ago
8

The process of combining rows and columns in a table is called _____.

Computers and Technology
1 answer:
Oksi-84 [34.3K]3 years ago
8 0
The Answer of the given question : D. Merging
You might be interested in
Book checkout scenario at a library: The Worker tells the System the identity of a patron who wishes to check out books. The Sys
Alinara [238K]

Answer:

Check the explanation

Explanation:

To solve the above question.

The two valid classes are:

1. Patron_identity

2. Books

Class generalization can be between Books and Patrol_identity to create a new superclass for All The Books that this patron has ever checked out.

Two valid associations can be between:

1.Patron_identity and books

2.Books and library catalogue

8 0
3 years ago
The first computer (the eniac was how big
sattari [20]
The first computer is the Eniac which was 50 tons!
3 0
2 years ago
What is a traditional tool used to align and mark vertical points from top to bottom?
amm1812
For the answer to the question above, <span>A </span>plumb bob<span>, or plummet, is a weight, usually with a pointed tip on the bottom, suspended from a string and used as a vertical reference line, or </span>plumb<span>-line. It is essentially the vertical equivalent of a "water level".</span>
7 0
2 years ago
Please please help I don’t understand this
Firlakuza [10]
The answer is D, “Check for Accuracy”. You have to make sure everything is accurate at the end.
8 0
3 years ago
At the start of the school year, Brianna’s history teacher announces that students’ final grades will be weighted based on how t
Dennis_Churaev [7]

Answer:

it is A

Explanation:

did on edge test

5 0
2 years ago
Read 2 more answers
Other questions:
  • How is a computer component, such as a network card, commonly marked for identification?
    12·1 answer
  • If you want to be more efficient at using the World Wide Web, refresh the page often.
    7·1 answer
  • Where can you find gradpoint answers
    13·2 answers
  • Who PLAYS Apex Legend?
    10·2 answers
  • i know this not school related but my grandmothers RCA RCT6272W23 tablet is saying type password to decrypt storage and i dont k
    5·1 answer
  • Which key should you press and hold to select multiple cells?
    8·2 answers
  • "The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a ce
    7·1 answer
  • String[][] arr = {{"Hello,", "Hi,", "Hey,"}, {"it's", "it is", "it really is"}, {"nice", "great", "a pleasure"},
    11·1 answer
  • Write an algorithm for finding the perimeter of a rectangle
    6·1 answer
  • Consider the following code snippet that appears in a subclass: public void deposit(double amount) { transactionCount ++; deposi
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!