1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
2 years ago
7

Which function is used for creating a date table?

Computers and Technology
1 answer:
netineya [11]2 years ago
4 0

Explanation:

When one wants to express his or her feelings on each other

You might be interested in
A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
lesantik [10]

Answer:

Malware

Explanation:

It has the following characteristics:

• They are the most common in the network, and the difference with computer viruses is that they do not need user intervention.

• has the characteristic of replicating itself to expand through the networks to which a device is connected.

• When entering a computer, the worm tries to obtain the addresses of other computers through your contact lists, to infect them as well.

• They do not have to manipulate any program or make the computer malfunction, which makes them a little more difficult to detect.

• Take into account that Malware is "malicious software".

 

8 0
3 years ago
If you were doing a regular expression inside a Linux command line, which special character on the keyboard would give you two p
Murrr4er [49]

Answer: car | truck

Explanation: The pipe (|) symbol used can be used in regular expression to simply imply OR. This means when used in between expression, can be used to search for all matches of the strings in which it stands in between. In the scenario above, If the pipe symbol is located in between the two strings, such as [ cars | trucks], the expression returns possible occurrence of the strings cars and trucks. It may also be used to locate and return the occurrences of more than 2 strings, such as; string1 | string2 | string3

6 0
3 years ago
Write down 5 tips that an office can use to be more sustainable and reduce wastage? Write a description of each one and how it r
Evgen [1.6K]

1 Use water cooler

2 Avoid single use drink container for guests

3 Bring lunches in reusable containers

4 Paper waste reduction

take paperless notes

5 Use both sides of paper while printing, coping and writing

8 0
3 years ago
Of the three different types of résumé formats (chronological, functional, or combination), which format would you use to create
Varvara68 [4.7K]

Of the three types of resume formats (chronological, functional, or combination), I would select the combination format.

Explanation

Choosing the type of Resume depends on what you want your employer to see and the circumstances you are currently in. Some would prefer the chronological Resume because it the most popular Resume used. However, choosing a chronological resume while you are in the process of switching careers or have recently joined the job market is not a good idea. It is specifically meant for those people who have experience. Functional Resume, on the other hand, works well in situations where people have gaps in their work history or looking to switch from one career to the another one.

Combination Resume, in my opinion, stands out as the most preferred Resume to use. It is a combination of chronological and Functional Resumes. A combination Resume;

  • Helps you highlight both your transferable skills and work history
  • It can be used by older workers, those in internship programs, people seeking to switch careers, and experienced workers.
  • It helps showcase your skillset and helps highlight “why you think you are the best fit for the role” question.

Learn more about interview process and Resume structure

brainly.com/question/9018115

#LearnwithBrainly

3 0
3 years ago
Read 2 more answers
What is the purpose of a mail merge field?
goblinko [34]

Answer:

Mail Merge is a way to send the same message to a large number of persons, with each one properly addressed to a specific person.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • What so the term used to describe how many bits are used in each pixel?
    7·1 answer
  • The exercise instructions here are long -- please read them all carefully. If you see an internal scrollbar to the right of thes
    15·1 answer
  • The parameter passing mechanisn used in C is
    5·2 answers
  • This matches the domain name with the correct IP address:
    12·1 answer
  • Sharon must give an informative presentation to a group of teenagers about cultivating earthworms for use in home gardening. Whi
    11·2 answers
  • What are the services offered by web-based email?​
    12·1 answer
  • All the network nodes are connected to each other
    8·1 answer
  • Escribe 10 ejemplos de lo que consideras un byte
    5·1 answer
  • When must an Assured Equipment Grounding Conductor Program (AEGCP) be in place?
    13·1 answer
  • 3.2.3 What major al able to do? 3.2.4 What major advantage would Printer X have for Tembi who want documents printed? 3.3 If Tem
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!