1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juli2301 [7.4K]
3 years ago
14

1. “Paraan nga dyan, Liza!" A.tae B.utit C.pwet

Computers and Technology
1 answer:
mariarad [96]3 years ago
3 0

Answer:

B

Explanation:

You might be interested in
2. It enables you to gather data on a specific topic. *a.Interviewb.Questionnairec.Surveyd.Research
Assoli18 [71]

Answer:

Explanation:

am pro

7 0
3 years ago
Which type of network medium is used by an integrated services digital network adapter?
user100 [1]
ISDN uses a two-wire telephone line.
8 0
4 years ago
Which of the following is a part of a DML statement? a. CREATE b. ALTER c. DROP d. SELECT. SE_LECT
Margaret [11]

d. SELECT

"SELECT" is a part of a DML statement.

What is DML?

DML, or Data Manipulation Language, is a subset of database operations used to insert, delete, and update data. A DML is frequently a sublanguage of a larger language, such as SQL; DML includes some of the language's operators. Because some users can perform both read and write selection, selecting read-only data is closely related to and sometimes considered a component of a DML.

Structured Query Language, or SQL, is a popular data manipulation language that is used to retrieve and manipulate data in a relational database. SQL allows you to perform database operations as well as create databases. SQL performs the required tasks by using specific commands such as Create, Drop, Insert, and so on.

To know more about DML, visit: brainly.com/question/25757965

#SPJ4

8 0
1 year ago
You are auditing a client's network and have gained physical access to a workstation. To prevent any security software from dete
Llana [10]

Answer:

OphCrack LiveCD.

Explanation:

The user examines that server of a client, as well as requires complete control of such a system. To avoid recognizing its invasion by certain security programs, he wants to select a LiveCD which can break Operating System's credentials,  and he would have been using OphCrack LiveCD because it used to crack the credential of the Windows user.

So, the following are the reason by which the answer is correct according to the scenario.

3 0
3 years ago
Frrrrrrrrrrreeeeeeeeee brainliest for u
sukhopar [10]

Answer:

Yay I want brainliest

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Discuss the important basic building blocks required to create a web page in HTML/XHTML. Discuss how to place CSS rules within y
    15·1 answer
  • How can you tell if a hacker has administrative access?
    15·2 answers
  • What is intellectual property?
    7·1 answer
  • This was a quiz that I submitted earlier in the semester but I had not received full points due to a coding mistake. Below, I wi
    14·1 answer
  • Two friends are eating dinner at a restaurant. The bill comes in the amount of 47.28 dollars. The friends decide to split the bi
    5·1 answer
  • Special variables that hold copies of function arguments are called _________.
    11·1 answer
  • javascript Write a program to calculate the credit card balance after one year if a person only pays the minimum monthly payment
    7·1 answer
  • Case Study
    15·1 answer
  • Importance of spread sheets​
    8·2 answers
  • After inserting a video into your slide how can you test it
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!