1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
11

To order the records in the answer to a query in a particular way, you ____ the records.

Computers and Technology
1 answer:
Alex_Xolod [135]3 years ago
8 0
To order the records in the answer to a query in a particular way, you "Sort" the records. Sorting the records will allow the user to sort the sequence of the records based on his or her preferences, he or she may sort it ascending or descending.<span />
You might be interested in
Which wireless communication technology is most likely used when synchronizing device information to an automobile?
seropon [69]
Bluetooth is the most reasonable answer
8 0
4 years ago
What versions of Wi-Fi Protected Access (WPA) were defined after the IEEE ratified the IEEE 802.11i security standard
aliya0001 [1]

Answer:

John is good in math rewrite it and punctuate

8 0
3 years ago
Your organization will be handling market trades. You will be required to verify the identify of each customer who is executing
zmey [24]

Answer:

The correct answer for the following question will be Digital certificate.

Explanation:

An electronic "password" that allows an organization or person to exchange information (data) with security using the public key infrastructure (PKI) over the internet called as Digital certificate. And is also known as Public key certificate and identity certificate.

Digital certificate contains the following things :

  • Copy of certificate holder public key.
  • Name of certificate holder.
  • Serial number which is used to uniquely identify a certificate.
  • Expiration dates.
  • Digital signature of certificates.

What security provided :

  • Identification/Authentication.
  • Access Control.
  • Non-Repudiation.
  • Integrity.

 

5 0
4 years ago
In MATLAB please.
Leona [35]

Answer:

function [Area,Perimeter,L]=f_circle(x)

 % Area: pi*x^2 area of circle with radius x

 % Perimeter: 2*pi*x perimeter length of circle with radius x

 % x can be a vector

 minargs=1;maxargs=1;narginchk(minargs,maxargs);  % only 1 input accepted

   if ~isequal('double',class(x))                   5 input has to be type double

       disp('input type not double');

       return;

   end

   Area=pi*x.^2;

   Perimeter=2*pi*x;

 end

4 0
3 years ago
What missing condition will give you the output shown?
Leokris [45]

Answer:

B

Explanation:

I hope this helps!

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?
    10·1 answer
  • Web and mobile applications allow users to be actively engaged in an online activity
    5·2 answers
  • Protected base class members cannot be accessed by: a.friends of the base class.
    6·1 answer
  • Before desktop computers made italic fonts available in the home and office, writers used underlining to:
    12·1 answer
  • What is the meaning of website cookies? brief explanation ​
    9·2 answers
  • After Brooke has helped Simon to resolve his original problem, Simon asks her about another linked workbook he has received. The
    7·1 answer
  • What is word length in computer​
    10·2 answers
  • Robin has four copies of her midterm paper saved to a single folder on her
    9·1 answer
  • Does anyone know the name of the font :) ?
    14·2 answers
  • You want to read input from the user to know how many apples they would like
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!