1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valkas [14]
3 years ago
7

Question 1 Excel is a tool used to A create a spreadsheet B design a brochure C make a presentation D write a letter

Computers and Technology
1 answer:
aev [14]3 years ago
8 0

Q1- it is A: Create a spreadsheet


You might be interested in
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
What should you install in a server room that will save space by allowing you to control multiple servers with a single mouse, k
Nata [24]

Answer:

a KVM switch

Explanation:

KVM switch is devise used for handling or connecting different server at any time by using single mouse, monitor and keyboard. it is like an interface used to connect different server at any given time.

different type of KVM switch are

1) USB based KVm

2) Emulated USB type KVM

3) DDM USB type KVM

4) semi -DDM KVM

7 0
3 years ago
You've been asked to find the average of a range of numbers. Which of the following could you use to find the average of cells A
labwork [276]

Answer:

D. =AVERAGE(A1:A10)

Explanation:

The answer is D.

With option A. It means the cell should contain the minimum figure in the range of cells <em>(A1:A10).</em>

With option B. It means the cell should contain the total sum of the figures in the range of cells <em>(A1:A10).</em>

With option C. It means the cell should contain the maximum figure of the range of cells <em>(A1:A10)</em>

5 0
3 years ago
All modern cd-r drives are _______________, such that you can go back and burn additional data onto the cd-r disc until the disc
ratelena [41]
All modern cd-r drives are writable, such that you can go back and burn additional data onto the cd-r disc until the disc is full.
6 0
3 years ago
Who made computer ? Which year?
myrzilka [38]

Answer:

The first computer that resembled the modern machines we see today was invented by Charles Babbage between 1833 and 1871.

8 0
2 years ago
Read 2 more answers
Other questions:
  • Drag each label to the correct location on the image.
    10·1 answer
  • You have just installed a new sound card in your system, and Windows says the card installed with no errors. When you plug up th
    5·1 answer
  • The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future
    13·1 answer
  • How do you innovate or improve a product?
    12·1 answer
  • Count positive and negative number and compute the average. The program will have the user input an unspecified number of intege
    6·1 answer
  • Which one of the following, in addition to disciplinary programs and drug-testing, can employers misuse as a form of retaliation
    8·1 answer
  • Assume user_name equals "Tom" and user_age equals 22. What is printed on the console when the following statement is executed? c
    14·1 answer
  • You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
    6·2 answers
  • You send a friend a private message about something personal that is going on with you. Without permission, she forwards your te
    10·1 answer
  • How to add a while loop? here's my code
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!