1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kompoz [17]
3 years ago
15

45 points!!

Computers and Technology
2 answers:
Alex Ar [27]3 years ago
7 0

Answer:

ENQUIRE

Explanation:

Tim Berners-Lee built a database called <u>ENQUIRE</u>.

pav-90 [236]3 years ago
5 0

Answer:

ENQUIRE database system

Explanation:

You might be interested in
Jill is setting up a presentation and wants to use a built-in equation, such as the area of a triangle. To insert this in her pr
Alex73 [517]
The mathematical operations/symbol/formulae can be inserted into MS powerpoint using equation editor. Just follow these steps:
1)click on the Insert
2) Select Object from the list
3) Select Equation Editor from the list and the dialog box of equation editor will open up. Now, write, edit your equation in this box. When you return back to powerpoint slide, the equation will come on the current slide, you are working on.
4 0
4 years ago
Read 2 more answers
During the system investigation stage, __________ studies are done to determine if the hardware, software, and communications co
oksano4ka [1.4K]

Answer:

The correct answer is "Technical Feasibility".

Explanation:

System investigation is used to Review that whether the system is feasible or not for the proposal that they will design or creating.in the system investigation stage, we do the technical feasibility. The technical feasibility is used to check technical resources like hardware, software, etc in the organization.

The  Technical Feasibility in the System investigation  is used to solve the problem of business

6 0
4 years ago
Which term describes a protocol to manage a network able to configure out a network monitor activity and control devices
cricket20 [7]

Answer:

im not sure but my brother told me it's Simple Network Management Protocol

7 0
3 years ago
Which of these apps could be a Trojan Horse designed to install malware on your system? Select all that apply. *
____ [38]

Answer:

Probably the third one

Explanation:

The ring tone apps are most likely designed to do that kind of stuff

7 0
3 years ago
What are SmartArt graphics?
Alik [6]

Answer:

Option A

Explanation:

SmartArt graphic are nothing but the visual representation of ideas or information by using layouts that fits the context of the presentation. These smart art graphics include - sequence diagram, venn diagram, organizational chart etc. These smart art are part of MS office programs  i.e MS Word, MS Powerpoint, MS excel etc.

Hence, option A is correct

4 0
3 years ago
Other questions:
  • Windows 7 is used to run ____ software
    5·2 answers
  • An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
    5·1 answer
  • In c++
    9·1 answer
  • Technician A says underinflation of a tire causes excessive one-sided wear on one side of the tread. Technician B says overinfla
    11·2 answers
  • What short (two letters!) but powerful boolean operator can check whether or not one string can be found in another string?
    12·1 answer
  • Identify the output, input, and any missing information for the following problem. George wants to find out how much extra he wi
    15·1 answer
  • Which of the following views hides the ribbon and shows text on the screen in an easy-to-read format?: *
    11·1 answer
  • Information systems include all of these
    5·1 answer
  • How can you ensure that the website you are using is secured?
    8·1 answer
  • Which of the following is not a data in python. float, integer, bool, str.​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!