1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
2 years ago
7

In cell b12 create a formula using max f7nction to calculate maximum value in B4:B9

Computers and Technology
1 answer:
Nikitich [7]2 years ago
4 0

a is the answer

Explanation:

You might be interested in
To “synthesize” means to combine information to create new information.<br> YES or NO
KIM [24]

Answer:Yes

Explanation:

6 0
3 years ago
Read 2 more answers
true or false: if a comment is posted anonymously, it cannot be considered hate speech or cyber bullying
pickupchik [31]

Answer:

false

Explanation:

Think about it

5 0
3 years ago
Read 2 more answers
An ecommerce ____________ is the software that handles ecommerce transactions.​
Shkiper50 [21]
<span>An ecommerce application is the software that handles ecommerce transactions.​  It helps customers to find products, make a selection and submit payment.  A key component of an ecommerce application is an online shopping cart. </span>
7 0
3 years ago
If you have access to an ssn, but do not have permission to view certain folders or documents in that ssn, those folders and doc
hodyreva [135]
<span>If I remember it correct, if you have access to an ssn, but do not have permission to view certain folders or documents in that ssn, those folders and documents will be hidden. Or it depends on OS. But in most ways its hidden or masked.</span>
5 0
3 years ago
Read 2 more answers
Which of the following types of servers can be used to cache requested Internet resources so that they can be more quickly deliv
omeli [17]

Answer:

Proxy Server

Explanation:

  • Proxy server is a server that acts as a mediator between two systems.
  • One system can be your computer and the other can be the server to which you are asking a service, such as requesting a web page.
  • Lets suppose you request a web page from a server and you type a URL of a website to access a web page.
  • This request goes to proxy server which sends this request on your behalf to the target server in order to retrieve that web page.
  • Proxy server makes this request to the target server on the internet by using one of its IP addresses.
  • When the proxy server gets that web page, it will forward that web page to your requesting computer.
  • If you request a specific service such as a website frequently the proxy server saves that website on its cache.
  • So if you request that website again, proxy server will forward it to you from its cache rather than requesting it again from the target server on your behalf resulting in quick response to the user's request. This speeds up the delivery of resources to the users.
  • Proxy servers provide users with privacy to access the websites, and they can surf the internet anonymously .
8 0
3 years ago
Other questions:
  • Special programs that facilitate communication between a device and the os are called
    12·1 answer
  • Suppose you use Batch Gradient Descent to train a neural network and you plot the training error at every epoch. If you notice t
    7·1 answer
  • Consider the unsigned decimal number 35. What is the value in hexadecimal?<br><br> 3510 = _______ 16
    9·1 answer
  • Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett
    15·1 answer
  • Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
    14·1 answer
  • What correctly describes the features of the service called kickstarter?
    14·2 answers
  • WHICH PROGRAMMING LANGUAGES ARE THE BEST FOR PROGRAMMING?
    14·1 answer
  • Give an example of what Artificial Intelligence application most popular is used on a daily basis.
    12·2 answers
  • A data use agreement is required when a researcher uses a limited data set (lds). an lds must have:_________
    14·1 answer
  • Does the source MAC address match your PC interface?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!