Answer:
Queries.
Explanation:
Queries can perform many different functions in a database. Their most common function is to retrieve specific data from the tables. The data you want to see is usually spread across several tables, and queries allow you to view it in a single datasheet.
A database query is a way of requesting information from the database.
Regardless of the database or query language used, there are two primary types of queries that can be used for different goals:
-Select queries return information from one or more tables. While this is the most basic type of query, select queries can be used to specify how many results are returned, the order in which they appear, the source(s) used, and the parameters for a record to be included.
-Action queries perform a command on the data that has been retrieved, such as delete, alter, create, or update. This query allows a user to modify a large number of records in bulk instead of one at a time.
Make sure you create your own answer with this information or else it will be found as plagiarized!
Which are types of wired connections for PANs?
Access point
Bluetooth
FireWire
USB
Choose 2 answers
If you select one slice of pie in a pie chart, you have selected a ____
data series
data set
data point
data line
Answer:
a date point I think I don't really know
write keyboard shortcut to insert footnote and endnote
Answer:
Alt + Ctrl + F to insert a footnote.
Alt + Ctrl + D to insert an endnote.
Correct me, if I am wrong :)
Have a great day!
Thanks!
The diagram shows the parts of a computer. In which part is data processing done?
Answer: Control unit
Explanation: Took test
Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of the information?.
The Traffic Light Protocol (TLP) was created in order to facilitate greater sharing of information. TLP is a set of designations used to ensure that sensitive information is shared with the appropriate audience. It employs four colors to indicate expected sharing boundaries to be applied by the recipient(s).
cisagov
Which of the following is a Reach Key on your keyboard?
O H key
OF key
O J key
O S key
Answer:J key
Explanation:I want my brainlyiest pls
Answer: 3
Explanation:
The J key.
Your computer will organize files into _______ order.
A) Chronological
B) Size
C) No specific
D) Alphabetical
Brainliest for (CORRECT) answer
Answer:
c is the answer of the question
Answer:
A chronological
I'm sorry if I am wrong
!!! PLEASE HELP ASAP REALLY NEED IT !!!
which of the following is NOT a reason to make a payment online?
A- Time saving
B- Do not have a computer
C- Paper free
D- Less hassle
Answer: B
This is honestly confusing, this is the only one that makes sense...
Answer:
B but i would say all answers are correct and B seems the most logical
As a web designer, what are 3 different careers that you can have? Explain each and choose one that you would like to personally have
Applications developer: An application developer's typical responsibilities include coding, designing, application management, troubleshooting, monitoring updates and possible security threats, and providing end user support. They may also handle some project management tasks on the journey to building a new application.
Game developer:A video game developer is a software developer specializing in video game development – the process and related disciplines of creating video games
Multimedia programmer: Multimedia programmers are specialist software engineers and have the knowledge to choose the right programming language, such as HTML, Flash, PHP, etc.. Multimedia is often also described as new media, interactive media, digital media
online/internet services:An online service refers to any information and services provided over the Internet. These services not only allow subscribers to communicate with each other, but they also provide unlimited access to information.
To send the content of one file to another file, you can use the _______ redirector.
Hope this helps!
Keith would like to compare data he has collected from research. The data includes the electrical output
current from five different chips. Which type of graph should he use?
a line graph
a bar graph
a pie graph
an area graph
Answer: my test says line graph soooo….
Explanation: if its what the test says
Checking for and correcting errors may need to be done numerous during which of the following phases of the software development life cycle (SDLC)?
A.
planning
B.
designing
C.
developing
D.
testing
Answer: planning
Explanation:
How to tell if your computer is 32 or 64-bit windows 10.
Answer:
Find operating system info in Windows 10
Select the Start button > Settings > System > About . Open About settings. Under Device specifications > System type, see if you're running a 32-bit or 64-bit version of Windows.Under Windows specifications, check which edition and version of Windows your device is running.HELPPP! MARK YOU THE BRAINLIEST!
Write one smart goal It has to be realistic ?
Background information The SMART in SMART goals stands for Specific, Measurable, Achievable, Relevant, and Time-Bound Defining these parameters as they pertain to your goal helps ensure that your objectives are attainable within a certain time frame.
Answer:
My goal is to have good grades because I failing now and I want to try and try to get my grade up if I do I will be successful and when I grow up I will have a good job and a better life for me and my family.If I success my life will be so different.
what operating system good for 3d modeler
Answer:
If you're looking for a distribution to use for 3D work, we would recommend trying either CentOS or Ubuntu, in second place. It can be installed on any PC computer that is able to run windows, and can even dual boot. It can not, however run windows or mac applications.
Explanation:
I hope this helps!How to mark a discussion as read on canvas dashboard.
Answer:
On a discussion page, scroll to the top, to the right of the edit button, click on the three vertical dots, and select "Mark all as Read." Explanation:
B. In cell G2, enter a formula using the AND function that includes structured references to display TRUE if a project has a [Project Type] of "Mixed Use" and a [Funding Type] of "Loan". Fill the range G3:G13 with the formula in cell G2 if Excel does not do so automatically
Excel formulas are expressions used to perform computation.
The Excel formula to enter in cell G2 is = IF(AND(D2 = "Mixed Use", E2 = "Loan"), "True", "False")
How to determine the Excel formulaFrom the question, we have:
Cell D2 represents [Project Type] Cell E2 represents [Funding Type]The Excel AND function is represented as:
= IF(AND([condition 1],[condition 2]), [Value if true], [Value if false])
So, we have:
= IF(AND(D2 = "Mixed Use", E2 = "Loan"), "True", "False")
Hence, the Excel formula to enter in cell G2 is = IF(AND(D2 = "Mixed Use", E2 = "Loan"), "True", "False")
Read more about Excel formulas at:
https://brainly.com/question/14820723
if your cell phone rings while you are driving and you do not have a hands-free device you should
Answer:
wait to get to a red light or a stop sign then answer it and put it on speaker phone
Explanation:
ANs and WANs can be set up in several different shapes, also known as peripherals.
A.
True
B.
False
Answer:
The Answer Is False Because They Aren't Called Peripherals
what dose a hard drive do
Answer:
What does a hard drive do? Simply put, a hard drive stores data. On a computer, this includes all of your photos, videos, music, documents, and applications, and beyond that, the code for your computer's operating system, frameworks, and drivers are stored on hard drives too.
8 9. McWhorter argues that being able to understand in textspeak has many of the same benefits as being able to speak two languages. Can this same argument be applied to emojis? Why or why not?
NEED HELP ASAP WILL GIVE BRAINIST TO BEST AWNSER
Answer:
yes because i could use ️ to say im eating a chicken leg and or talking with my mouth full and got slapped so yes i believe so
Explanation:
Answer: Yes because if you speak in "emoji" you technically can talk in any language you want because whoever you are sending it to could knows what you're implying by them
Explanation:
Assignment 6: Animation
I am stuck and am wondering where I need to place an if statement and what needs to be in it.
Answer:
its because you should have put (BODY_LEN./2 on line 45 instead of (BODEY_LEN./2) and in line 23 it should have been else: (counter < 185) and if any one deletes my answer its because you dont understand coding and you dont know how complex it is to code and make games, content and animations as simple as that Katie
Explanation:
What is the first step of the procedure to protect the GRUB (GRand Unified Bootloader) 2 boot loader with a password
The first part of GRUB (GRand Unified Bootloader) is to resides on the MBR/GT.
The configuration file for the GRUB (GRand Unified Bootloader) 2 boot loader is Grub.cfgThe second step of the procedure to protect the GRUB (GRand Unified Bootloader) 2 boot loader with a password is to Enter the word grub2-mkpasswd-pbkdf2 to start creating a cryptographic hash of a password.What is grub?The term grub is known as GRand Unified Bootloader. GRUB (GRand Unified Bootloader is known to be a kind of boot loader package.
It was said to be developed so as to aid a lot of (multiple) operating systems and it is one that helps the user to select among them when they are in boot-up.
Learn more about GRUB from
https://brainly.com/question/6093142
why might enforcement policies be used to prevent usb tethering when a smartphone is brought to the workplace
Enforcement policies can be applied to prevent sensitive company information from being extracted by an employee using a USB-connected mobile device.
What is the enforcement policy?The enforcement policy is a set of rules and regulations that limit the actions of an employee during their work in the company. These compliance policies establish codes of behavior, clothing, data processing and other matters relevant to the company.
In accordance with the above, the enforcement policy can establish a rule for employees to avoid extracting confidential or proprietary information from the company using mobile devices.
Learn more about enforcement policies in: https://brainly.com/question/10220062
Which of the following activities is not permissible for IT professionals while on the job? Check all of the boxes that apply.
working on a side job while at work for one’s primary job
viewing s3xual content on a company computer
sending coworkers an e-mail joke containing suggestive humor
downloading music from a file-sharing service
The activities that is not permissible for IT professionals while on the job are option A, B, C and D.
Working on a side job while at work for one’s primary jobViewing s3xual content on a company computerSending coworkers an e-mail joke containing suggestive humorDownloading music from a file-sharing service What values underpin the IT industry?In the workplace, employees are frequently required to uphold professionalism, also the issue of accountability, as well as integrity. This entails managing private information responsibly, ensuring a secure workplace, and abstaining from illegal behavior like taking bribes.
IT specialists are the people that often design, test, as well as install, maintain, and that of repair hardware and software for businesses.
Therefore, Employees have a responsibility to comprehend a user's capabilities and needs in order to supply the goods and services that best satisfy those needs, subject, of course, to financial and logistical limitations. The public expects professionals to contribute significantly to society and to behave responsibly.
Learn more about IT professionals from
https://brainly.com/question/17496239
#SPJ1
Does anyone know to code for 2. 12. 5 four corners in Codehs will mark brainliest
Answer:
speed(0)
square_length = int(input("What is the length of the square?"))
def draw_square():
pendown()
for i in range(4):
forward(square_length)
left(90)
penup()
penup()
setposition(-200, -200)
draw_square()
penup()
setposition(-200, 200 - square_length)
draw_square()
penup()
setposition(200 - square_length, 200 - square_length)
draw_square()
penup()
setposition(200 - square_length, -200)
draw_square()
Explanation:
Why are we currently undergoing a switch from ipv4 to ipv6?.
There are not enough addresses in IPv4 to support all of these devices of the lPv6 also allows for more secure communications between these already insecure devices
Why is data-driven analytics of interest to companies?.
Data-driven analytics enables data processing through intelligent algorithms, helping companies scale business intelligence and improve decision-making.
What is Data-driven analytics?It is a technology that allows data processing to be carried out within the database, that is, it is based on statistical algorithms that allow information analysis to be carried out.
Importance of Data-driven analytics to companiesIt allows organizations to analyze all their data to identify patterns and automate decisions.It is used in various industries to allow businesses to verify and refute existing theories or models.Create projections on the future impact of making a specific decision, accelerating response times to market opportunities or difficulties.Therefore, we can conclude that Data-driven analytics drives companies forward by introducing algorithms to optimize better decision making.
Learn more about Data-driven analytics here: https://brainly.com/question/26684573
Which does an artboard layer allow users to create in photoshop?.
An artboard layer allow users to create multiple canvases in a single document.
What is an Artboard?This is defined as a graphic design application which is mainly used in the creation of product mockups.
it can be used in photoshops and help create multiple canvases in a single document which is why it is regarded as an important application in graphic designing.
Read more about Artboard here https://brainly.com/question/7221559
Every artboard has its own set of layers, component groups, text, smart objects, and whatever else a PSD document can have.
Artboard Layer:In a Layers palette, you may change the layering order in each image as well as the order of the artboards themselves.Users can use an artboard layer to generate many canvases in a single document.It is a graphic design program that is primarily used for the creation of product mockups.This may be used in Photoshop to create several canvases in a single project, which is why it is considered a useful tool in graphic design.Find out more about Artboard here:
brainly.com/question/26821177
________is the most popular public key algorithm available and can be used for digital signatures, key exchange, encryption, and decryption.
Answer:
RSA
Explanation:
Pretty sure it's RSA, hope this helps!