1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
3 years ago
15

What is the correct format to use when inserting a date in Excel?

Computers and Technology
1 answer:
kykrilka [37]3 years ago
5 0

Answer:

Dates are whole numbers

Usually, when you insert a date in a cell it is displayed in the format dd/mm/yyyy.

Explanation:

You might be interested in
A new company has proposed a number of different cache layouts for their system and you’ve
jonny [76]

Answer:

66 bytes, 50 bytes and 27 bytes

Explanation:

Cache can be defined as an area or type of computer memory in which information that is often in use can be stored temporarily and got to especially quickly.

It's a hardware or software that is used to store something, usually data, temporarily in a computing environment.

See attachment for a step by step solution to the questions.

4 0
3 years ago
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authen
Ksju [112]

Answer: Authorization process

Explanation

Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.

Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.

Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".

5 0
4 years ago
Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?
Nat2105 [25]

Answer:

The certification developed by the SANS is GIAC certification .In this there are 3 certification GSEC,GISF and GCED .The description of these certification is given below .

Explanation:

The GIAC certification course is providing the knowledge of the security like cryptography ,networkig knowledge etc .

GSEC:The GSEC Certification is the certification of the security.It simply means this certification certified about the security risk in the computer system .

GISF: This certification gives the knowledge of the networking as well as the security in the computer system also it gives the knowledge of the cryptography.

GCED :This certification is also providing the knowledge of security as well as networking.

Difference between GIAC and  InfoSec certifications is given below

  • The SANS certification is giving the knowledge about the security risk as well as cryptography by the professional where as the InfoSec certifications providing the knowledge of the hacking by the professional .
  • The SANS is including the certification of  GIAC certification where as the InfoSec certifications is including the  CISSP and SSCP certification .
4 0
3 years ago
How Charles Babbage Concept of<br>Computer has help the modern<br>Computer​
OLga [1]

English mathematician and inventor Charles Babbage is credited with having conceived the first automatic digital computer. During the mid-1830s Babbage developed plans for the Analytical Engine. Although it was never completed, the Analytical Engine would have had most of the basic elements of the present-day computer.

6 0
3 years ago
Write the definition of a function that takes as input the three numbers. The function returns true if the first number to the p
sattari [20]

Answer:

I am writing a C++ program.

Here is the function CheckPower() which is a bool return type function which means it will return either true of false. This function has three double type parameters. This function returns true if the first number to the power of the second number equals the third number; otherwise, it returns false.

bool CheckPower(double number1, double number2, double number3)

{

   double power; // stores value of number1 to the power number2

   power = pow(number1,number2); // pow() function to computer power

   if (power==number3) // if the value of power is equal to third no number3

       return true; // returns true

   else // if above condition evaluate to false then returns false

       return false;

}

Explanation:

Lets take the values of number1 = 3, number2 = 2 and number3 = 9 to understand the above function.

The pow() function is a power function to calculate the result of number1 raised to the power of number2. Here number1 is the base number and number2 is exponent number. As number1 = 3 and number2 = 2 so this is equivalent to 3² . So 3 raise to the power 2 is 9. The value stored in power is 9.

power = 9

Next, the if condition checks if the value in power is equal to the value of number3. The value of number3 is 9 and the value in power variable is also 9 so the If condition evaluates to true. So the if part is executed which returns true.

If the value of number3 is, lets say, 10 then the If condition evaluates false as the value of power is not equal to value of number3. So the else part is executed which returns false.

If you want to see the output of this function you can write a main() function as following:

int main()

{   double num1, num2, num3;

   cout << "enter first number: ";

   cin >> num1;

   cout << "enter second number: ";

   cin >> num2;

   cout << "enter third number: ";

   cin >> num3;

   if(CheckPower(num1, num2, num3))

   { cout<<"True";    }

   else

   { cout<<"False";  }    }

This is a main() function which asks the user to enter the values of three numbers num1, num2 and num3. The if condition calls CheckPower() function to check if the first number to the power of the second number equals the third number. If this condition evaluates to true, the message True is displayed on the screen otherwise message False is displayed on output screen.

The screen shot of program along with its output is attached.

3 0
4 years ago
Other questions:
  • Which computer tools allow you to communicate with coworkers, family,and friends
    8·1 answer
  • Although highly accurate navigational information from the GPS constellation is exploitable by adversary forces, it is unlikely
    5·1 answer
  • How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
    15·1 answer
  • Malware that is spread through security warnings or advertisements for antivirus software is known as
    5·1 answer
  • Cómo mi dificar el aspecto del texto​
    12·2 answers
  • An enhancement to a computer accelerates some mode of execution by a factor of 10. The enhanced mode is used 50% of the time, me
    11·1 answer
  • HTML question please help
    5·1 answer
  • Convert Octal 623, to Decimal number ​
    10·1 answer
  • Write its features:features of computer ​
    15·1 answer
  • Which of the following is/are used in multimedia?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!