1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leviafan [203]
3 years ago
8

Which can be used to enter and manipulate information in a database?

Computers and Technology
1 answer:
mihalych1998 [28]3 years ago
5 0

Answer:

It's a table.

Explanation:

You use a table to add in information, which also lets you manipulate the information.

You might be interested in
Information technology student Roberta has been assigned a project on how to detect unwanted outgoing attacks. Which step is par
tino4ka555 [31]

The attacks from the malware and the viruses to the system are considered as the unwanted attacks. These attacks detection can be performed by ensuring whether the system responds to port 443 by initiating Apache.

<h3>What is the function of port 443?</h3>

The port 443 in the computer system is the virtual port that functions with the diversion of the network. The presence of the unwanted attack blocks the response of the port 443.

Therefore, to detect the attack, the response of the system to port 443 with the starting of Apache must be checked.

Learn more about port 443, here:

brainly.com/question/13140343

#SPJ1

5 0
2 years ago
What is the khan academy game where it is a block having to jump over lava and is an endless runner
saw5 [17]

Answer:https://www.khanacademy.org/computer-programming/lava-the-impossible-game-by-swax97/4638717300965376/embedded?id=1436456095000-0.5&origin=undefined&buttons=yes&embed=yes&editor=no&author=yes

Explanation:

5 0
4 years ago
The most common cause of foodborne illness is
nignag [31]

Answer:

Food posioning

Explanation:

8 0
4 years ago
Read 2 more answers
What is the purpose of HTML?
Basile [38]
You can style and structure with it so it’s either one of those
3 0
3 years ago
You should always buy the biggest camera bag that you can find for extra equipment
zysi [14]
False bbfderaddfdffffgfgdhgft
5 0
4 years ago
Read 2 more answers
Other questions:
  • From the Table Style Options area of the Design tab, you select Banded Columns. What will happen to your table?
    11·1 answer
  • Is Windows a:<br><br> A.operating system<br> B.software<br> C.hardware<br> D.input device
    12·1 answer
  • What is an allocation unit?
    10·1 answer
  • What will be the value of i after the C statements at the right have been executed
    6·1 answer
  • AW Computing uses a private sharing model for cases. A select group of five users need read/write access to all cases with a spe
    8·1 answer
  • А.<br> is the highest education degree available at a community college.
    6·1 answer
  • When you want to specify multiple criteria, and all criteria must be true for a record to be included in the results, when the _
    9·1 answer
  • a paragraph is a segment of text with the same format that begins when you press the enter key and ends when you press enter key
    6·2 answers
  • Amazon Web Services and Microsoft Azure are some of the most widely used _______.
    7·1 answer
  • Identify the technique to free up the CPU by allowing device controllers to independently transfer data between the device and m
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!