1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VikaD [51]
3 years ago
10

Daniel makes changes to a workbook named “Results.” He saves the file as “New Results” but did not realize that a worksheet name

d “Bonus” has an external link to the original “Results” workbook. David opens the “Bonus” worksheet and sees an error message stating the workbook has links to other data sources. What steps should Daniel perform to fix this error?
Computers and Technology
1 answer:
elena55 [62]3 years ago
7 0
All he would need to do is go into the sheet and change the name again. This will change the HTML so the computer will not be confused. The name should make sense, but he completely different from the original name :)
You might be interested in
What is the difference, if any, between a Portable Media Player (PMP) and a Digital Media Device (DMD)? PMPs can be analog or di
lara [203]

Answer:

PMPs are typically referred to interchangeably.

Explanation:

3 0
3 years ago
Load the we8there data set from the textir package. List the first 5 restaurants’ ratings from we8thereRatings. Based on we8ther
Readme [11.4K]

Answer:

> we8thereRatings[1:5,]

  Food Service Value Atmosphere Overall

1     5       5     5          5       5

2     5       5     5          5       5

5     5       5     4          4       5

11    5       5     5          5       5

12    5       5     5          4       5

3 0
3 years ago
What is something about online conferencing that you understand better now. <br> What did you learn?
Mazyrski [523]

Answer:

man this question is really about your personal experience but i'll try my best to answer this

Explanation:

onnline Web Conferencing is used by businesses and now schools who went to online because of the virus. for businesses i learned they use it to present and share with online collaboration on different applications including documents, web sites, data files, video, emails, and reduce the time and cost of business travel for meetings. i understand now that online conferencing can be used for Applications for web conferencing include meetings, training events, lectures, or presentations from a web-connected computer to other web-connected computers.

4 0
3 years ago
These factors influence the design of a network.
REY [17]
Availability ,devices and applications, performance, security, scalability.
8 0
3 years ago
Read 2 more answers
Classify each of the following acts as a violation of confidentiality, of data integrity, source integrity, or availability, or
AlexFokin [52]

Answer:

A) Violation of Confidentiality and Source Integrity:

Passwords are very confidential information and are usually protected by both the owner and the ower of the system (which in this case is Yahoo). To obtain the passwords, the hacker had to illegally gain access to the source of the data which is on Yahoo servers. Hence a breach of confidentiality and lack of adequate integrity on the part of Yahoo.

B) Source Integrity: Anthony accidentally cuts the electricity from the server room. Why would he be able to do that? how did he gain access into the server room? This speaks to source integrity. People should not be able to access the server room except they are authorised.

C) Source Integrity and Confidentiality: NSA finds an efficient method to break AES. AES refers to the Advanced Encryption Standard. AES is a symmetric encryption technology known as a block cipher.

It is used by the United States Government for the classification of information. Their ability to break this code speaks to Violation of Source Integrity. In this case, they haven't exactly hacked any document. However, any document that was encrypted using this technology is already compromised at the source.

D)   Anna registers the domain name, "JohnSmith" and refuses to let John Smith buy or use the domain name: Violation of Availability.

It is assumed here that John Smith was the original owner of the domain but it was highjacked at expiration and registered by Anna. This kind of breach is called Violation of Availability of the domain name.

E) Some malware encrypts the victim’s hard drive with a secret key and a criminal asks for a ransom to decrypt.

This move is called the Ransomeware attack. The Integrity of the source of information (which is the hard drive) is already compromised. This is a combination of Source Integrity or availability and confidentiality violation.

F) The wiretapping of a cell phone is a breach of confidentiality and data integrity.

G) when there is a vulnerability in a system or software that is unknown to those who should be interested, it is called a Zero-Day vulnerability. Where there is a Zero-Day vulnerability there could be a violation of confidentiality, data integrity, source data and or it's availability.

Cheers!

4 0
3 years ago
Other questions:
  • What is the car on the right?
    7·1 answer
  • Which is a benefit of owning a desktop computer instead of a laptop?
    13·2 answers
  • The windows troubleshooting utility that identifies and eliminates nonessential files is called _____.
    15·2 answers
  • What does it mean when your check engine light comes on?
    7·1 answer
  • The term "Cloud" refers to what option(s) below? (Select all that apply)
    13·1 answer
  • What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
    11·1 answer
  • A technician removes the cap from the brake fluid reservoir and finds that the rubber boot in the cap is swollen. technician a s
    8·1 answer
  • What are all the physical components called?
    6·1 answer
  • Converting Denary to Binary
    15·1 answer
  • Running the Disk Cleanup utility is a quick way to ________. Group of answer choices defrag your hard drive remove spyware progr
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!