1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
4 years ago
11

Alicia uses a software application to store the names, email addresses, and phone numbers of her friends in alphabetical order. 

She uses the Retrieve option to locate a number. Which type of software application is she most likely using?
Computers and Technology
1 answer:
SpyIntel [72]4 years ago
6 0

I think she's using Excel.

You might be interested in
If a database table is to hold data on 52 students it must have 52?
Marina CMI [18]

Answer:

yes

Explanation:

6 0
3 years ago
What is the first step you should take when you want to open a savings account?
pav-90 [236]
 First Go to the bank
Second Present Photo ID
 third Fill out application

I would think review the different savings account options that your bank offers...

Last Make initial deposit.



Hope that helps!!!

.
5 0
3 years ago
How does computer applications affect our lives daily? 1- paragraph (4 sentences)
Mnenie [13.5K]

Answer:

Computers affect our lives daily because we use them everyday to browse the internet and solve problems in real life. They help solve problems and without them, getting certain information would be much harder. They help us interact with friends from anywhere in the world and communicate with relatives. It has also helped us during this pandemic and lets us learn from school in the safety of our own home.

( hope this helps, i wrote it myself ;-; )

4 0
3 years ago
Read 2 more answers
How to transfer audio files from computer to android?
fenix001 [56]
U can use Bluetooth connect your computer to the android. <span />
5 0
4 years ago
Wireless attacks avoid the access points to limit detection. <br> a. True <br> b. False
-BARSIC- [3]

Answer:

Option B i.e., False.

Explanation:

The weakness, KRACK tricks a wifi access points to reuse an in-use encryption, enabling the intruder to decode and interpret data intended to remain encrypted. Wireless communication encrypts, that decrypt unencrypted wireless network activity and expose sensitive data.

So, the following scenario is false about the wireless attack.

6 0
3 years ago
Other questions:
  • Implement the function calcWordFrequencies() that uses a single prompt to read a list of words (separated by spaces). Then, the
    8·1 answer
  • A vehicle travels 2345 m in 315 toward the evening sun. What is its velocity
    13·1 answer
  • Select the instances in which you should include a comma.
    14·1 answer
  • A sample containing 4.30 g of O2 gas has an initial volume of 13.0 L. What is the final volume, in liters, when each of the foll
    5·1 answer
  • Write the equivalent c++ expression for the following algebraic expressions
    11·1 answer
  • Are high tech messages are always preferable to low tech messages
    8·1 answer
  • Karin realized that a song takes up a lot more space on her computer than the lyrics of the song typed out in ms word document .
    12·1 answer
  • A computer takes a lot of time to do complex calculation​
    9·1 answer
  • WHAT DO U MEANS BY DIGITAL PROFILE​
    15·1 answer
  • How did people figure qwerty keyboard set up, instead of the abcdef setup?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!