1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
2 years ago
7

How to share excel file for multiple users office 365?.

Computers and Technology
2 answers:
Reil [10]2 years ago
7 0
Click the Review tab.
Click Share Workbook in the Changes group.
On the Editing tab, click to select the Allow changes by more than one user at the same time. ...
In the Save As dialog box, save the shared workbook on a network location where other users can gain access to it.

Or try emailing
Sholpan [36]2 years ago
5 0

Answer:

You would need that person email to share it with them.

You might be interested in
How many bits are required to write decimal number?
Aleks [24]
There is a amount of 1,00
6 0
3 years ago
9. The monumental failure of Atari's E.T Extra-terrestrial was, among other things, due to the fact that ______________
nlexa [21]

Answer:

c

Explanation:

5 0
3 years ago
HELP ASAP!!!
Crazy boy [7]
The answer is a C..ur welcome
5 0
4 years ago
The figure above shows a DC motor that contains a series field winding (F1) with a resistance of 10 , a parallel field winding (
shtirl [24]
Soooooooooooooooo you need to click c to get the right answer

 
5 0
3 years ago
Read 2 more answers
In response to an alert regarding a possible security incident, you are analyzing the logs for a web application. In the process
SOVA2 [1]

The type of attack was most likely attempted against the application is an  XSS attack.

<h3>Why is the above an  XSS attack?</h3>

This attack is known to be an example of an XSS attack as it is one that is often recorded by the log of a web server's log.

Conclusively, Note that in this attack, if you see the HTML encoding, one can say that is mainly an XSS attack but when you see SQL or XML statements in the string, then it is another.

Learn more about attack from

brainly.com/question/76529

#SPJ1

4 0
2 years ago
Other questions:
  • What type of operating system runs a dedicated electronic device such as a smart thermostat?
    5·1 answer
  • When a program lets the user know that an invalid choice has been made, this is known as:?
    6·1 answer
  • Before you start creating a database, you should first use paper to plan, test, and revise. True False
    7·2 answers
  • In c++
    9·1 answer
  • You have a site (Site1) that has about 20 users. For the last few months, users at Site1 have been complaining about the perform
    9·1 answer
  • When you add text to a slide using presentation software, which of the following is important?
    12·2 answers
  • Which of the following refers to a descriptive technique involving the systematic collection of quantitative​ information? A. Lo
    5·1 answer
  • 2. Suppose a computer using direct mapped cache has 220 words of main memory and a cache of 32 blocks, where each cache block co
    10·1 answer
  • Which of the following shows how to correctly declare pointer variable x?
    7·1 answer
  • Suppose that you are given the following partial data segment. what value does idtype contain, in decimal?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!