1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
3 years ago
13

A10:A20 Refer to values in

Computers and Technology
1 answer:
Keith_Richards [23]3 years ago
8 0
The range of cells in column A and rows 10 through 20
You might be interested in
How to make logo black and white in paint?
Pie
Change the color to black and white
7 0
3 years ago
Kim is writing a sql query that will pull a list of customers with outstanding orders and the sales rep for each order. What sho
Step2247 [10]

What the phrase should say in Kim's SQL Query is;  WHERE Customer = Sales Rep

<h3>What is SQL Query?</h3>

Structured Query Language (SQL) is defined as a standardized programming language that is used to manage relational databases and perform various operations on the data in them.

Now in SQL Query, when one SQL query is embedded in another SQL query to simulate a join, the second SQL query is embedded in the "WHERE" of the first query.

Since the query will pull a list of customers with outstanding orders and the sales rep for each order. Then, the where phrase will be;

WHERE Customer = Sales Rep

Read more about SQL Query at; brainly.com/question/10097523

6 0
2 years ago
WHAT IS A COMPUTER ????
Allushta [10]
A piece of technology
6 0
4 years ago
Read 2 more answers
he primary purpose of a database query is to a. find and retrieve specific information. b. correct information in the database.
cestrela7 [59]

Answer:

find and retrieve specific information

Explanation:

7 0
2 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Other questions:
  • How can you logout your account and do not want to have this anymore
    12·2 answers
  • ​A(n) ____ will hold an online auction buyer’s payment until he or she is satisfied that the item bought matches the seller’s de
    13·1 answer
  • A golf ball is at rest on the grass. What must happen to cause the ball to move?
    5·1 answer
  • Steps in the systems development life cycle​
    15·2 answers
  • Which type of loan is based on financial need
    6·1 answer
  • REPORT THIS USER. HE'S SHOWING HIS YK WHAT TO EVERYONE INCLUDING ME. HIS ACCOUNT PROFILE IS IN THE PICTURE BELOW
    14·1 answer
  • Evie clicks through her presentation slides and realizes they all have transition effects coming from the same location, from th
    13·1 answer
  • Write a program that converts or calculates values. Use the following guidelines to write your program:
    9·1 answer
  • Answered
    10·1 answer
  • Help PLEASE ILL MARK as brainlest
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!