1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iVinArrow [24]
3 years ago
11

I NEED THIS NOW!! :((

Computers and Technology
2 answers:
Finger [1]3 years ago
6 0

which feature of a database allows a user to locate a specific record using keywords?

search

ASHA 777 [7]3 years ago
3 0
The answer is search
You might be interested in
How was the Big Ben project similar to the investigation you conducted in class to determine if the table was vibrating? How is
a_sh-v [17]

Answer:

Mate it has been about two months

Explanation:

3 0
3 years ago
Display the desktop without minimizing or closing any windows.
KonstantinChe [14]

The desktop can be fully displayed without minimizing or closing any windows by maximizing it.

<h3>What is a desktop display?</h3>

The desktop display is the computer monitor that shows the graphical interface of the window screen.

In the desktop mode on your window, you can display your entire desktop screen by clicking on the maximize button.

  • This enables you to see each icon on the screen clearly.

The image attached below shows a clear view of how to display the screen without minimizing or closing any windows.

Learn more about the desktop display here:

brainly.com/question/8384714

7 0
3 years ago
6. Which of the following options is used to view a computer's memory properties?
pentagon [3]
There is an option used to vew a computer's memory properties by just simply opening your My computer directory. There you can see different names of your hard drive, there you choose what hard drive you want to view by just right clicking it and choosing properties. There you will see it's memory space.
3 0
4 years ago
Can someone who is good at 9th class IT (cbsce) can help me in my homework​
postnew [5]

Answer: yeah

Explanation:

4 0
3 years ago
Establishing responsibilities, planning to best support the organization, acquiring validity, ensuring performance, conformity w
RUDIKE [14]

Answer: B. ISO 38500

Explanation:

ISO 38500 is an international Standard specifically developed by the International Organization for Standardization to oversee corporate governance of Information Technology. It lays down principles to guide directors and leaders of organizations on how to comply with regulatory requirements in the use of Information Technology within the firm.

The framework consists of six guiding principles in the use of I.T and they include; establishing responsibilities, planning or strategizing on how best to support the organization, acquisition of validity, ensuring performance, conformity with rules and respect of the human factor or behavior.

It was derived from the Australian Standard for Corporate Governance of Information and Communication Technology - AS 8015 - 200.

8 0
3 years ago
Other questions:
  • Pls help me. ask yourself what would jesus do...
    14·1 answer
  • Instructions: Type the correct answer in the box. Spell the word correctly.
    5·2 answers
  • What is the purpose of look up tables in spreadsheet software apex
    13·1 answer
  • The critical path in a project network is:______ A. The Shortest path through the network. B. Longest path through the network.
    8·1 answer
  • Ophelia is entering a Get Fit! sporting goods store in a shopping mall when her heel gets caught in a heating grate at the thres
    9·1 answer
  • If object B inherits from object A, then which of the following statements is true?
    15·1 answer
  • Explain with a few sentences and using the terms sequencing, selections and loops how they
    9·1 answer
  • What is the ratio of the length of the room to its area where Area = 22 x 12?
    8·1 answer
  • A company has a number of employees. The attributes of EMPLOYEE include Employee ID (identifier), Name, Address, and Birthdate.
    11·1 answer
  • What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!