1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
3 years ago
10

What is alphuneric text not intended for calculation entered into a spreadsheet called?

Computers and Technology
1 answer:
Over [174]3 years ago
7 0
It is called text or general.
You might be interested in
Name the bar that displays the information about the current document like the number of pages and words
Wittaler [7]

Answer:

Word Status Bar or Status Bar

Explanation:

3 0
3 years ago
The processing that’s done by the DBMS is typically referred to as:______.
Vilka [71]

Answer:

Option b is the correct answer for the above question.

Explanation:

The DBMS is used to manage the information or data which is stored to use in the future. Any project has two sides one is the front end and the other is back-end. The front-end refers to the graphics which are visible to the user of the project but the data is not stored on the side of the project it is stored on any database software which can be called for the request of any event of the project. The database is stored on the backed of the project so to bring the data from the database, the process is known as back-end processing.

The above question wants to ask about the process of DBMS which is said to the back-end process because the DBMS process the data and to process the data is known as the back-end process. So Option b is  the correct while the other is not because--

  • Option 'a' states about front-end-processing which processes the design of the websites.
  • Option c states about the file server which is said to the DBMS.
  • Option d states about the management system which is not in the project.
5 0
4 years ago
You decide to configure ntp on the router to get time ntp server with an ip address of 172.17.8.254 which commanda should you us
Morgarella [4.7K]
Telenet into the router, authenticate and type enable once the prompt is back type ntp server 172.17.8.254 do this on all routers.
4 0
3 years ago
Brianna is feeling overwhelmed by the amount of digital
SIZIF [17.4K]

Information literacy defines the ability to indentify, gather and make good use of available information in to solve problems and increase productivity. Being able to decipher between factual and reliable information can be developed through critical consumption.

The size and amount of available information is so enormous, however, a sizeable amount of these information are not reliable and usually misleading.

Critical consumption allows individuals understand which of the information they require needs are true or untrue.

Hence, Brianna needs to develop her critical consumption skill in other to discern which of the information he needs.

Learn more :brainly.com/question/25284700

4 0
3 years ago
Best web hosting for beginners in 2020?
Evgen [1.6K]

Answer:

Digital Ocean (but you need to set it up first)

Explanation:

If you are a student, I would recommend Digital Ocean, as you get £50 free credit as part of the GitHub Student Pack. (I believe you have to pay in a little bit however). There are also other reputable hosting providers, AWS should do the trick. For people just starting out, I would recommend hosting from their own machine. If you don't want to pay ever, and are just using basic HTML/CSS, you can use GitHub Pages as a means to host websites.

DO / AWS will only provide you with a blank Linux box, it would then be up to you to install suitable website hosting software - such as Apache/Nginx ect...

8 0
3 years ago
Other questions:
  • After an object has been instantiated, its methods can be accessed using the object's _____, a dot, and a method call
    7·1 answer
  • Garrett has a column of data. What can he do at the bottom of that column of data using an Auto function? Check all that apply.
    8·2 answers
  • What do you call when a hacker users multiple guest computers to crack a password?
    11·1 answer
  • Discuss whether the redundant data should be addressed prior to beginning the wireless network architecture project, in coordina
    11·1 answer
  • Your friend is an intern at the local Department of Health and needs to prepare a report about the recent activity of the influe
    9·2 answers
  • What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
    14·1 answer
  • N men and N women were participating in a stable matching process in a small town named Walnut Grove. A stable matching was foun
    12·1 answer
  • A Variable can only hold numbers<br><br> True<br><br> False
    15·2 answers
  • I need like 10 sentences to delineate and discuss societal issues related to computing . “Including the guiding principles of pr
    9·1 answer
  • Bitmap images are ________ into different software applications.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!