1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paladinen [302]
3 years ago
8

If you delete selected cells using the Delete key on your keyboard, only the _______ of the cells is removed. formatting content

comments hyperlinks
Computers and Technology
2 answers:
kap26 [50]3 years ago
8 0
If you delete selected cells using the Delete key on your keyboard, only the _______ of the cells is removed.
Content
miss Akunina [59]3 years ago
5 0

Answer:

the answer is content

Explanation:

You might be interested in
Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
Sindrei [870]

Answer:

Cloud Computing        

Explanation:

Cloud Computing is basically an infrastructure to deliver various computing resources and services  to the users online (via Internet). These resources include networks, applications, servers, databases, software, storage etc.

These services are mostly utilized by organizations for recovery and backup of data, using virtual hardware and other computing resources such as desktops, memory etc. Cloud computing is also used for developing software, for securing data by providing with access control and for storing bulk of data.

The benefits of cloud computing are as following:

Because of cloud computing the customers do not have to buy hardware or install software on their computer which might be very costly to maintain and update. Servers and data centers are provided by cloud service providers and experts are available for managing the services and resources.

These services are scalable and can be adjusted as per the users requirements.

Cloud computing offers a variety of protocols, tools, and access controls that improve security and protects confidential data, applications, and networks against security threats and attacks. It also provides with data backup, disaster recovery.

5 0
3 years ago
Which data type is also called a binary object?
Andrej [43]
Binary large objects(BLOb):this data type is also called a binary object, and its fields are called binary fields.
7 0
3 years ago
Read 2 more answers
Select all that apply.
professor190 [17]
Social worker and legal aid worker

4 0
3 years ago
Read 2 more answers
The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one
I am Lyosha [343]

Answer:

grid computing

Explanation:

Based on the information provided within the question it can be said that this technology is typically known as grid computing. Like mentioned in the question, this is a type of processor architecture in which various computer resources are combines from different domains in order to work together towards a common main objective. Which is exactly what SETI has done by using many individual's computers to essentially create one supercomputer capable of handling all the data.

6 0
3 years ago
1. As part of your community, your school, and your neighbourhood, how else does ICT have an impact on social
NeX [460]

Answer:

helthcare systems, aviation, entertainment, retail, etc

Explanation:

ICT has made life easy, it has made an interconection accross the world. in the helthcare system, ICT has created a positive impact because now a days body check up is been made through computers.

in the aviation, we use computers to control the the traffic of airplanes.

5 0
3 years ago
Other questions:
  • The countryside presents
    11·1 answer
  • To create a formula in. . You would first click in one of the cells
    12·2 answers
  • Which famous individuals was born on october 31st?
    7·1 answer
  • Write a brief, two-page paper describing how your lifestyle and values impact your use of the Web for e-commerce. How is your on
    15·1 answer
  • How many strings with five or more characters can be formed from the letters in seeress?
    15·1 answer
  • What is the missing line of code?
    7·1 answer
  • Role of memory in a computer system
    10·1 answer
  • The use of a concept or product from one technology to solve a problem in an unrelated one
    11·1 answer
  • Have the javascript function CountingMinutes(str) take the str parameter being passed which will be two times (each properly for
    9·1 answer
  • The rectangular symbol in flowchart<br> is used to denote dash
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!