1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trapecia [35]
3 years ago
7

A. =A1<= A14 B. Income – Expenses C. SUM(A1:A14) D. =150*.05

Computers and Technology
1 answer:
Tpy6a [65]3 years ago
8 0
B that the anser yep i whent and reserch the the anser so itsb
You might be interested in
Yo, how can I bypass the securely filter on a chromebook?
OLga [1]
Open your Chromebook and press the power button for 30 seconds. This should bypass the admin block.

Proxy Websites. Probably one of the oldest methods of bypassing web filters, proxy websites enable users to anonymously connect to websites through outside servers. ...
VPNs. VPNS or Virtual Private Networks, work as a tunnel between two devices. ...
Browser Extensions. ...
Stolen Passwords. ...
Firefox from USB. ...
5 0
3 years ago
Which of the following is a technique for storing or copying log events to acentralized logging server?a. Syslogb. Write­once re
Neporo4naja [7]

Answer:A) Syslog

Explanation: Syslog is the log for the messaging in the computing field.It acts as a separator for the different task that is related to messaging. The task usually are storing of message, production of the message through software,analyzing message, reporting it etc.

Other options given in the question such as WORM storage is for the storage technology,UTM is for the management for the threat situation and firewall logging is related with log/tables for firewall.

Thus, the correct option is option (A).

5 0
3 years ago
what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Zigmanuir [339]

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:

8 0
3 years ago
Overheating of a computer can be easily prevented. Explain how​
elixir [45]
Here are a few examples:

•] Keep away from windows or vents to prevent it from turning warm.

•] Clean off dust that’s on the computer.

•] Remove all the things that are blocking air to pass to let it cool down.

•] Putting a soft item below the computer is a action that is prohibited as it blocks the airways which causes it to overheat instead put it on a sturdy flat surface to prevent the aforementioned information.

•] To never overcharge your computer too 100% overnight or any time of the day since it overheats and causes battery life to be short, instead put it to charge when you’re conscious while keeping an eye on it, perhaps set a timer/alarm to notify you if you forget.
5 0
3 years ago
If a 60 lb. load is placed on the platform, what will the pressure gauge reading be if the piston area is 5 sq.in? Give your ans
Doss [256]

Answer:

The pressure gauge reading will be;

12 psi

Explanation:

The question relates to relationship of pressure and area

The given parameters for the measurement are;

The weight of the load = 60 lb

The required area of the piston = 5 in.²

Pressure exerted by a force can be defined as follows;

Pressure =  \dfrac{Force}{Area}

The weight of the load = The force applied by the load

Therefore;

Pressure =  \dfrac{Force}{Area} = \dfrac{60 \ lb}{5 \ in.^2}  = 12\dfrac{lb}{in.^2} = 12 \ psi

The gauge reading will be 12 psi.

7 0
3 years ago
Read 2 more answers
Other questions:
  • A network administrator needs information about the printers that employees can access. Where can he find the information? The a
    10·2 answers
  • dentify the type of observational study​ (cross-sectional, retrospective, or​ prospective) described below. A research company u
    5·1 answer
  • A service provider, hardware, and web browser are needed to connect to __________.
    8·2 answers
  • The part of the poppet valve that contacts the valve seat is called the?
    10·2 answers
  • Provide an example where a company has demonetized a market or industry.
    8·1 answer
  • Please help with this coding question
    8·2 answers
  • Which of the following is a characteristic of a college savings plan
    6·2 answers
  • The BCD number for decimal 473 is( ). a) 111011010; b) 010011110011; c) 010001110011; d)0010110110​
    15·1 answer
  • A bitmap image is provided in two different resolutions. Image 1 has a resolution of 1500 x 1225. Image 2 has a resolution of 50
    15·1 answer
  • From which os did windows xp evolve?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!