1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
4 years ago
10

Tables draw your attention to specific information in a spreadsheet. Please select the best answer from the choices provided T F

Computers and Technology
1 answer:
qaws [65]4 years ago
3 0

Answer:

True

Explanation:

Using a Data table in a spread sheet will make it more appealing to the eyes and just looks more professional in general.

You might be interested in
How would you classify the earliest historical examples of STEM discoveries provided in this lesson?
krek1111 [17]
It’s scientific discoveries
7 0
4 years ago
A binary search algorithm is written (as in the modules, for example) which searches a pre-sorted array for some user-defined va
Mazyrski [523]

Answer:

c) it will always return with an answer of 7 or fewer comparisons of data.

Explanation:

As maximum number of comparison in worst case for sorted binary search is log₂n, here n = 100, so maximum search is at least 6.6 which is approximately 7.

4 0
3 years ago
. Each ____ on a menu performs a specific action.
Fofino [41]
The answer would be d, none kf the above.
4 0
3 years ago
What is 1/10 of 2.0 in decimal form​
son4ous [18]

Answer to this is .2

5 0
4 years ago
The Security Configuration Wizard saves any changes that are made as a __________ security policy which can be used as a baselin
Brums [2.3K]

Complete Question:

The Security Configuration Wizard saves any changes that are made as a __________ security policy which can be used as a baseline and applied to other servers in the network.

Group of answer choices

A. user- or server-specific

B. port- or program-specific

C. role- or function-specific

D. file or folder-specific

Answer:

C. role- or function-specific.

Explanation:

The Security Configuration Wizard (SCW) was first used by Microsoft in its development of the Windows Server 2003 Service Pack 1. The main purpose of the SCW is to provide guidance to network administrators, secure domain controllers, firewall rules and reduce the attack surface on production servers.

Generally, The Security Configuration Wizard saves any changes that are made as a role- or function-specific security policy which can be used as a baseline and applied to other servers in the network.

After a network administrator checks the Group policy, any changes made as a role- or function-specific security policy by the Security Configuration Wizard (SCW) is used as a baseline and can be applied either immediately or sometimes in the future to other servers in the network after it has been tested in a well secured environment.

Additionally, the Microsoft Security Configuration Wizard (SCW) assist administrators in running the following;

1. Network and Firewall Security settings.

2. Auditing Policy settings.

3. Registry settings.

4. Role-Based Service Configuration.

7 0
4 years ago
Other questions:
  • Peak download rate for a 4g network is __________. select one:
    12·2 answers
  • A consumer-directed digital or computer device that has a video output signal for displaying a video game is called a .......
    6·1 answer
  • C++ Fibonacci
    5·1 answer
  • If a suspect is not read his or her Miranda rights, then nothing the suspect says can be used at trial, even if the suspect volu
    11·1 answer
  • Instructions:Select the correct answer.
    5·1 answer
  • Create a function called howManyUntil(stopNum) where stopNum is an integer from 0 and 99
    12·1 answer
  • Cual es la constante de proporcionalidad de la función f(x)= 4x-6 ​
    7·1 answer
  • So i am taking to edhesive computer science course in my school, and i am confused on 1.6 code practice,
    15·1 answer
  • What are the advantages of mine shaft gear and the disadvantaged​
    9·1 answer
  • There are various risks from attacks on wi-fi networks. These include all of the following except _____.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!