1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
3 years ago
11

Which statements are true about making formatting changes to cells in Excel? (Select all that apply)

Computers and Technology
1 answer:
scoundrel [369]3 years ago
6 0
I agree that it should have been and was a and b.
You might be interested in
Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul
MrMuchimi
B. random-access memory
4 0
3 years ago
Read 2 more answers
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
When replacing a system board in a laptop, which feature is a must?
Sphinxa [80]
I would use a dual core Becuase a quad can be too space consuming and it can overheat the computers software
6 0
3 years ago
What is an oxidation state?
vekshin1
Based on the definition which states it is an indicator of oxidation of an atom in a chemical compound. I believe the most viable answer is the charge of an atom's ion.
7 0
3 years ago
_______ is the protocol suite for the current Internet.
Gala2k [10]
A? not very sure sorry
8 0
3 years ago
Other questions:
  • You just brought a new hard drive for your computer. U plan to use this as a secondary hard drive to store all your uma files. O
    10·1 answer
  • What is your understanding of the difference between a stream cipher and a block cipher?
    14·1 answer
  • What are 2 plants that grow best in our soil type ​
    9·1 answer
  • Consider the following recurrence, defined for n a power of 4 (for the time of some algorithm): T(n) = 3 if n = 1 2T(n/4) + 4n +
    10·1 answer
  • What area on the Microsoft® Publisher® application screen shows the name of the publication?
    9·1 answer
  • Identify a factor that is unlikely to influence the length of time people wait in the lunch line.
    8·2 answers
  • Which type of microscope can only be used to view non-living specimens?
    10·2 answers
  • 1. What does MS-DOS use for input?
    5·1 answer
  • Which branch of science helps avoid or minimize stress-related injuries at workplace?
    14·2 answers
  • The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary. manipulation
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!