1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olin [163]
3 years ago
6

Describing How to Print a Selected Record

Computers and Technology
1 answer:
Natali5045456 [20]3 years ago
5 0

Answer: A) File

Just took it (:

You might be interested in
Is the adoption rate of communication technology increasing ?
Neko [114]
More people adopt the technology during any period, leading to an increasing rate of adoption. So, yes
3 0
3 years ago
Read 2 more answers
The opening of the throttle plate can be delayed as long as
blsea [12.9K]
<h2>I'm trying to adjust the sawtooth throttle on my H. I can open the throttle to 8 notches from the top and it is at the 1815 rated rpm. When I go above that it will overspeed, up to 2500rpm! At the last notch on the quadrant. I have tried the adjustments in the governor, the only thing I have been able to do is set the high rpm screw so it stops at the 8th notch from the top. I should be able to have full use of the quadrant and not go over the 1815 rpm, right? Does anyone have a pic of the throttle linkage under the hood and how to adjust it? I've also tried adjusting the rod in the governor between it and the carb, it is tightened all the way up now. Any ideas what I am missing?</h2>
6 0
2 years ago
Which example can be considered master data in an organization?
Svetradugi [14.3K]
Employee information can be considered master data in an organization
3 0
3 years ago
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
ehidna [41]

Answer:

The correct answer to the following question will be "Secure".

Explanation:

This file includes information about the rights of verification and authorization.

  • It will be used primarily for monitoring the use of authorization schemes.
  • It holds all communications related to safety like faults in encryption.
  • This also monitors sshd logins, logins of SSH, as well as other system security resources daemon-logged failures.

So, it's the right answer.

3 0
2 years ago
Which two elements should be in a professional letter?​
blagie [28]
Intro, and Headings probably
4 0
2 years ago
Other questions:
  • What does this image represent?
    9·2 answers
  • Help me out with this .....
    10·1 answer
  • The Windows Operating System: A) is a web-based operating system for the Internet era. B) is a data management application used
    15·1 answer
  • "in program arrays12.java a swap method is called. does the swap method exchange parameter values x and y?"
    11·1 answer
  • Another pitfall cited in Section 1.10 is expecting to improve the overall performance of a computer by improving only one aspect
    13·1 answer
  • Which of the following tools and techniques shows theimpacts of one decision over another as well as the probability andcost of
    15·1 answer
  • Compare and contrats the vain digestive system from the human digestive system.​
    10·1 answer
  • A computer program that enables users to create and work with files and folders is called what?
    8·2 answers
  • Arrange these steps of creating a presentation in the correct order. (notice that the given order is incorrect other than the ba
    13·1 answer
  • X = 9 % 2if (x == 1):  print ("ONE")else:  print ("TWO")
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!