1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
egoroff_w [7]
3 years ago
10

Peter works on a huge database of numerical figures in a worksheet ranging from cell A1 to cell I50. He has to print the workshe

et and carry it to a client meeting. Which options should he select to fit the page to a standard A4 page for printing?
Computers and Technology
2 answers:
zvonat [6]3 years ago
5 0

Landscape and portrait is the answer

Amiraneli [1.4K]3 years ago
4 0
Landscape and portrait page orientation.
You might be interested in
True false) cad means computer aided manufacturing​
alina1380 [7]

Answer:

False.

Explanation:

Computer-aided design is the use of computers to aid in the creation, modification, analysis, or optimization of a design. Computer-aided design is also referred to as the CAD software. CAD would not mean computer aided manufacturing because the last word (manufacturing) starts with an M, not a D.

3 0
3 years ago
Which disipline involves creating computer networks
Anestetic [448]

Answer:

computer science

The discipline of computer science includes the study of algorithms and data structures, computer and network design, modeling data and information processes, and artificial intelligence.

Explanation:

hope this helps

brainliest plz

5 0
3 years ago
Read 2 more answers
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting th
Damm [24]

Answer: white hat hacker

Explanation:

Like other forms of hacker, white hat hackers also have wide range of knowledge of breaking into systems, overriding firewalls, bypassing security protocols and can also do all other things hackers do. But what differentiates white hat hackers is the motive behind what they do, in that they carry out all this test not for their personal gain but for the benefit of the owners and also with the approval of the owners. Because after carrying out tests on the ways of exploiting the loop holes in the system they reveal it to the manufacturer or system owners for correction.

4 0
4 years ago
One of the following is NOT a type of Intellectual Property
zmey [24]

Group of answer choices.

a) Copyright

b) Trademark

c) Trade Secrets

d) Privacy​

Answer:

d) Privacy​

Explanation:

An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect.

Simply stated, an intellectual property is an intangible creation of the human mind, ideas, thoughts or intelligence. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.

Generally, there are different types of intellectual property (IP) and this includes;

a) Copyright

b) Trademark

c) Trade Secrets

However, privacy is a type of intellectual property.

5 0
3 years ago
Give a common business example that mimics the differences between a shared
Serhud [2]

An  business example that mimics the differences between a shared network segment and a dedicated network segment is that of connection of work station transmission.

<h3>What is Shared segment network?</h3>

In this type of network,  local area network or an aspect of the local area network is said to have a lot of workstations and the multiple workstations are linked by using a hub

Note that all the workstation do not need to share the network capacity with other workstations but  an  business example that mimics the differences between a shared network segment and a dedicated network segment is that of connection of work station transmission.

Learn more about network segment from

brainly.com/question/7181203

#SPJ1

6 0
2 years ago
Other questions:
  • What will be displayed after the following statements have been executed? int x = 15, y = 26, z = 32; x = x + 12; y = y/6; z -=
    15·1 answer
  • Database designers typically do not add spaces in field names (LName), but can add details in the ________ field of the field pr
    9·1 answer
  • What is the value of vals[4][1]? double[][] vals = {{1.1, 1.3, 1.5}, {3.1, 3.3, 3.5}, {5.1, 5.3, 5.5}, {7.1, 7.3, 7.5}};
    6·1 answer
  • Give a logical expression with variables p,q, and r that is true if p and q are false and r is true and is otherwise false.
    5·1 answer
  • To delete the hyperlink but keep the text, right-click the hyperlink cell, and then click ____ hyperlink
    14·1 answer
  • What is a CPU or a GPU? What’s the difference? Which one is better?
    5·1 answer
  • What is Napoleon's friend's name? From the Napoleon Dynamite movie.
    14·1 answer
  • How do mass and social media differ
    8·1 answer
  • State four reasons why office automation is adopted in business establishment?​
    7·1 answer
  • In balloon framing, the second floor joist sits on a horizontal framing member called a _____.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!