1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
3 years ago
7

What is network days function

Computers and Technology
1 answer:
Crazy boy [7]3 years ago
4 0

Answer:

The NETWORKDAYS Function calculates the number of workdays between two dates in Excel. When using the function, the number of weekends are automatically excluded. It also allows you to skip specified holidays and only count business days. It is categorized in Excel as a Date/Time Function.

You might be interested in
What is the approximate boiling point
lesantik [10]
For water the approximate boiling point is 100 degrees Celsius.
<span />
4 0
3 years ago
In Python write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs
stealth61 [152]

Answer:

l = []

while True:

 no = int(input())

 if no>0:

   l.append(no)

 else:

   break

print(1)

If this helped consider marking this answer as brainliest. Have a good day.

3 0
2 years ago
In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and ins
Oduvanchick [21]

Answer:

MAN IN THE MIDDLE

Explanation:

Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties. When data is sent between a computer and a server, a cybercriminal can get in between and spy or eavesdrop.

A man in the middle attack can positions himself in a conversation between a user and an application in other to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

In a man-in-the-middle cyber-attack, the attacker places themselves in between two devices and monitor packets from the network, modifies them, and inserts them back into the network without the other parties knowing.

3 0
3 years ago
To erase a character to the right of the insertion point, press the ____ key(s).
jeka94
<span><span>CTRL+HOME then delete, backspace, end.</span></span>
8 0
3 years ago
What are the six peripherals of a computer system
Lubov Fominskaja [6]
Peripherals fall into three categories:
1. input devices are devices that put commands inside computers such as keyboards, mouses, and joysticks but the first two are the mostly used nowadays
2. output devices are what computers give out such as monitors, printers, speakers and I think projectors also fall into that category
3.storage devices such as a optical drive, hard drive, SDD, flash drive
So the main ones might be a mouse, keyboard, monitors, I think printers, hard drives and flash drives but speakers might be considered as one instead of a flash drive.

4 0
3 years ago
Other questions:
  • Create a class named BaseballGame that contains data fields for two team names and scores for each team in each of nine innings.
    12·1 answer
  • Information technology is the study of managing, processing, and retrieving information.
    5·1 answer
  • What is authentication?
    8·1 answer
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • When you make a pointer variable im C++, is star label a must?
    9·1 answer
  • Which question best addresses the issue of risk with a new job?
    7·2 answers
  • Windows on the desktop are just one of many objects used in a graphical user interface (GUI)-- buttons, drop-down list boxes, po
    7·1 answer
  • Why is it important to be a good digital citizen??
    11·1 answer
  • Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyram
    6·2 answers
  • Consider the following method, which is intended to return the index of the first negative integer in a given array of integers.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!