1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
diamong [38]
2 years ago
11

Select the correct answer.

Computers and Technology
2 answers:
svet-max [94.6K]2 years ago
8 0
Idek the answer tbh so yeah wassup wit it tho thrift
Sonja [21]2 years ago
7 0
Tbh i cant even tell you that
You might be interested in
I think my knee....
SIZIF [17.4K]

Answer:

Explanation:

is broken.

4 0
3 years ago
What may happen if a large number of computer users are attempting to access a Web site at the same time that you are?
TEA [102]
D because at the same time it might be long


4 0
3 years ago
Read 2 more answers
What is a logical grouping of related records called?.
irakobra [83]

Answer:

File

Explanation:

Files are frequently classified by the application for which they are primarily used (employee file). A primarily key in a file is the field whose value identifies a record among others in a data file

6 0
3 years ago
If one of the data values being entered into a table by the INSERT command violates an existing constraint, the remaining portio
Fittoniya [83]

Answer:

False

Explanation:

If one of the data values being entered into a table by the INSERT command violates an existing constraint, the database raises an error and none of the records aimed in the insert command is added.

Thus, in insert command syntax and column specifications has to be met in order to add any values being entered.

8 0
3 years ago
Which of the following statements is true of field names?
antiseptic1488 [7]

C. They should use words such as Name and Date.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Branching is so called because <br>​
    5·2 answers
  • What is requirement analysis
    8·1 answer
  • Which mode of IPSec should you use to assure the integrity and confidentiality of data within the same LAN?a. AH promiscuous mod
    6·1 answer
  • Which loan type requires you to make loan payments while you’re attending school?
    9·1 answer
  • Harry wants to change the background of all of his presentation slides. Which slide will enable him to make this change to all t
    14·1 answer
  • How to calculate a pid controller
    8·1 answer
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • How does computer store binary digits?​
    11·1 answer
  • Which of the following can a cell contain?
    9·2 answers
  • To enforce the concept of separating class definition from its function implementations, where should the function implementatio
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!