1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
3 years ago
14

What are options in the Advanced tab in the Share Workbook dialog box? Check all that apply

Computers and Technology
2 answers:
madam [21]3 years ago
7 0
Where are the options

Kruka [31]3 years ago
4 0

here are the options..

Don’t keep change history

Show comments made by all users

Update changes when file is saved

Track changes for certain amount of days

Allow changes by more than one user at a time

Automatically update changes in certain time periods


You might be interested in
Complete the function ConvertToDecadesAndYears to convert totalYears to decades and years. Return decades and years using the Ti
Sergeeva-Olga [200]

Answer:

It is a C++ program. The complete function   ConvertToDecadesAndYears which takes totalYears as parameter and convert totalYears to decades and years is provided in the attached document.

Explanation:

The explanation is provided in the attached document.

The screenshot of the complete code along with its output is attached.

6 0
3 years ago
A firewall filters traffic.true or false
valentinak56 [21]
Its TRUE firewalls filters traffic
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.Firewall typically establishes a barrier between a trusted internal network and untrusted external network such as the internet.
4 0
3 years ago
You work for manufacturing company who operate a hybrid infrastructure with systems located both in a local Datacentre and in AW
kotegsom [21]

Answer: Copy the files from the NAS to an S3 bucket with the One Zone-IA class

Explanation:

Th one Zone -IA class with S3 bucket has reduced cost but offers the same durability for which the files needs to be copied from NAS to access them faster.

8 0
3 years ago
The first step in planning effective writing is to consider the _____
Amiraneli [1.4K]

Its the purpose, not the audience the other idiot that answered the question is mad wrong

8 0
3 years ago
Which type of attack cripples the network and prevents legitimate users from accessing network resources
yaroslaw [1]

Answer:

A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.

Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.

1

What is a DDoS attack?

1.1 – Understanding a DDoS Attack

The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.

1.2 – What is the Goal Behind a DDoS Attack?

The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:

The website can become slow to respond to legitimate requests.

The website can be disabled entirely, making it impossible for legitimate users to access it.

6 0
3 years ago
Other questions:
  • Web pages with personal or biograpic information are called ​
    10·1 answer
  • Using Karnaugh maps, simplify the following Boolean function:
    14·1 answer
  • The United States is the only country in the world in which organs and tissue transplants are performed. True or False?
    8·1 answer
  • Unwanted emails are called:malware,phishing, spam or virus
    11·1 answer
  • What are the ASE special certifications?
    14·2 answers
  • What’s the most popular operating system
    9·2 answers
  • Your client noticed that his ad was disapproved for editorial reasons. Why is it important for him to understand and abide by Go
    9·1 answer
  • The appropriate semaphore in C to give one more turn to writer so it can clean up IPC objects is WRITE_SEM. Is it true or false
    5·1 answer
  • Hello pls answer<br><br><br>what is the use of loop in java​
    5·1 answer
  • Film’s importance in today’s economy?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!