1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
patriot [66]
2 years ago
15

HELPPPPP!!! Performance Check: Mini-Quiz

Computers and Technology
1 answer:
Novay_Z [31]2 years ago
7 0

Answer:

None of these po

Explanation:

Sana makatulong

You might be interested in
Diane, a developer, needs to program a logic component that will allow the user to enter a series of values
oee [108]
<h2>The Examples Of Users:</h2>
  • Form
  • Table
  • Query
<h2>The Answers Are:</h2>
  • Formatted summary of information from a database

  • User-friendly interface for adding to or retrieving information from a database

  • Stores raw data in a relational database

  • Retrieves specific information from a database. Can also be used to update, edit, and remove data
<h2>Hope it helps*^-^*All Correct!?</h2>
3 0
2 years ago
Which word processing tool can help you find synonyms to improve your word choice?
deff fn [24]
Grammarly is the answer
6 0
3 years ago
Read 2 more answers
Cite los botones de edición que existen y determine en que ficha y grupo se encuentran.
Alina [70]

Answer:

GHRUDIFDSFHEOUSDHFHESDHFHEFE

Explanation:

SORRY I DONT KNOW

5 0
3 years ago
You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an
lesya692 [45]

Answer:

The file system that we shall choose is NTFS file system.

Explanation:

NTFS file system is a file system developed by Microsoft that provides file system encryption. Encryption means to secure our data in such a way such that only authorized person's can have access to it. NTFS file system allows to encrypt data so that all our data is safe from various cyber related thefts thus making our system and data safe from vulnerability of theft.

Encryption does not prevent access to data but the data that is accessed by various agents remains meaningless to all the agents until the user of the data decrypts it.

3 0
3 years ago
Two hundred workstations and four servers on a single LAN are connected by a number of switches. You’re seeing an excessive numb
quester [9]

Answer:

Add more servers or decrease the amount of workstations

5 0
3 years ago
Other questions:
  • Zoom Vacuum, a family-owned manufacturer of high-end vacuums, has grown exponentially over the last few years. However, the comp
    11·1 answer
  • If you've been a victim of identity theft, what should you do after contacting the company that reported the suspicious charge a
    9·1 answer
  • 2. Because technology is always changing, there are new applications being developed constantly. (1 point)
    9·2 answers
  • Which of the following are tasks you can
    12·2 answers
  • Trudy is preparing a reply to an email message. Before she could send out the message, she is called for a meeting. If Trudy has
    6·2 answers
  • Which of the following words best describes the word icon ​
    14·2 answers
  • Need the answer ASAP!!!!!!!!!!!!! I’ll mark brainliest if correct
    8·1 answer
  • For this activity, you will practice being both proactive and reactive to bugs. Both are necessary to get rid of errors in code.
    5·1 answer
  • 1. why is manufacturing considered the biggest contributor to progress
    9·1 answer
  • The impact of the destruction of train station on the budget of the minister of finance
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!