1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
exis [7]
3 years ago
13

On a spreadsheet, this is the term for a grouping of cells that touch each other and form a rectangle. An example of it would be

written as (A3:C5).
A. Minimum
B. Range
C. Average
D. Sum
Computers and Technology
1 answer:
Allisa [31]3 years ago
3 0

Answer:

i think answer is range

You might be interested in
Which organization or agency would assist the fire department with incident scene security, crowd control, and explosives dispos
Sav [38]

The organization or agency would assist the fire department with incident scene security, crowd control, and explosives disposal is law <u>enforcement</u>.

<h3>What is Law enforcement?</h3>

Law enforcement is said to be activity of a given members of government and they are said to often act in an organized manner to enforce law by knowing , deterring people who violate the rules and regulations that are governing that society.

hence, The organization or agency would assist the fire department with incident scene security, crowd control, and explosives disposal is law <u>enforcement</u>.

Learn more about law enforcement from

brainly.com/question/21082629

#SPJ1

8 0
2 years ago
a_____________ may have its value change during program execution. options. flowchart,counter, Algorithm,None of them​
Amiraneli [1.4K]

Answer:

i think is "none of them"

5 0
3 years ago
Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c
TiliK225 [7]

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
4 0
3 years ago
Beth would like to eavesdrop on network traffic resulting from users browsing the Web. Which port would provide her with the mos
Elis [28]

Answer:

port 80

Explanation:

port 80 is http. port 443 is https. so if you are trying to be a sneaky little person and eavesdrop on people, eavesdrop on port 80 not port 443 because port 80 is unsecured plaintext data transmission over websites

7 0
3 years ago
Who is the Queen of rap?
mote1985 [20]

Answer:

A. Nicki Minaj

only valid answer but every1 else is good too!

5 0
2 years ago
Other questions:
  • What is workflow? how do you create your own workflow?
    15·1 answer
  • How to change screen brightness windows 10?
    7·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·2 answers
  • How do new sources of power assist in the development of inventions?
    15·1 answer
  • What does a proxy server do?<br> Help please!!
    12·1 answer
  • What's the main piece of information you look for in an e-mail message you're investigating??
    14·2 answers
  • What is a word processor in ms word​
    9·2 answers
  • Write a program that asks a user to enter a date in month day year format (for example 10 12 2016) and displays the day of the w
    5·1 answer
  • Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IP
    5·1 answer
  • Given a sorted list of integers, output the middle integer. assume the number of integers is always odd.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!