1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VMariaS [17]
3 years ago
7

Hudson has to maintain confidential college data in a workbook. He needs two team members to help him update data in the specifi

ed worksheet. He wants to prevent his team from deleting or updating the confidential data in certain cells. Which tab on the Format Cells dialog box will enable him to lock these cells?
Computers and Technology
2 answers:
g100num [7]3 years ago
7 0

Cell protection, i think is the answer

lina2011 [118]3 years ago
3 0
To protect the file,bring up the format cell dialog box and click on the protection tab, select the locked box and click OK. <span />
You might be interested in
Why do we people have feelings and emotions<br> Please help
m_a_m_a [10]
Explanation:
People have feelings and emotions because evolved emotions as ways of helping us to rapidly reorganise our mental and bodily resources to help us prepare for anything the world might throw at us. During our lives, each of us experiences millions of emotional reactions either consciously or unconsciously.
Hope this helps
3 0
3 years ago
Read 2 more answers
Why did industrial revolution begin Britain?​
allochka39001 [22]

Answer:

Britain also happened to have a wealth of coal, iron, and other resources in a relatively small area, which would help kick-start the Industrial Revolution. Its growing Colonial Empire also provided a ready-made (and captive) market for surplus goods, providing further impetus for entrepreneurs and new industrialists

7 0
1 year ago
Read 2 more answers
Ethernet ensures that _____ on a shared network never interfere with each other and become unreadable.
Dmitry [639]

Answer:

Signals.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Ethernet ensures that signals on a shared network never interfere with each other and become unreadable through the use of encapsulation and standard encryption protocols.

In Computer Networking, encapsulation can be defined as the process of adding a header to a data unit received by a lower layer protocol from a higher layer protocol during data transmission. This ultimately implies that, the header (segment) of a higher layer protocol such as an application layer, is the data of a lower layer such as a transportation layer in the Transmission Control Protocol and Internet Protocol (TCP/IP).

The TCP/IP model comprises of four (4) layers;

1. Application layer: this is the fourth layer of the TCP/IP model. Here, the data unit is encapsulated into segments and sent to the transport layer.

2. Transport layer (layer 3): it receives the segment and encapsulates it into packets and sends to the internet layer.

3. Internet layer (layer 2): packets are encapsulated into frames.

4. Network layer (layer 1): frames are then converted into bits and sent across the network (LAN).

Hence, the data unit encapsulated inside a packet is known as segment, which is typically referred to as packet segmentation.

Additionally, these data, segments, packets, frames and bits transmitted across various layers are known as protocol data units (PDUs).

8 0
3 years ago
Apps and applications are both software but have a number of significant differences
kipiarov [429]
Apps do a single function where applications do multiple functions
7 0
3 years ago
_____ is human thinking and problem-solving by a machine, including learning, reasoning, and self-correction.
Delvig [45]
Yea, artificial intelligence :/
4 0
2 years ago
Other questions:
  • Compare computer virus and worm ​
    10·2 answers
  • The "fathers of the internet" are vinton cerf and ________.
    9·1 answer
  • When cleaning a firearm, what end of the firearm should you generally clean from?
    11·2 answers
  • What short (two letters!) but powerful boolean operator can check whether or not one string can be found in another string?
    12·1 answer
  • What is the FICO system?
    12·1 answer
  • Which type of address is used at the transport layer to identify the receiving application?
    14·1 answer
  • .in the array based list implementation of the ADT what is the worst case time efficiency of the getEntry method?
    14·1 answer
  • Search engines enable you to
    12·1 answer
  • Yeah help me please......................
    9·1 answer
  • 1. What is the difference between background sound and nat sound
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!