1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vaieri [72.5K]
3 years ago
8

1. A(n)

Computers and Technology
1 answer:
Dennis_Churaev [7]3 years ago
4 0

Answer:

1.Spelling checker


2. Order of mathematical operations .

3. Series  

4. Pick from list  

5. Sum Function


6. Active Cell  

7. cell


8. Accounting format


9. Format

Explanation:

You might be interested in
Are used to connect a computer to a telephone line for dial-up internet access
Stella [2.4K]
I mean it typically goes wall jack to filter to line...
5 0
4 years ago
Sql injections is an attack in which __ code is inserted into strings that are later passed to an instance of sql server.
jek_recluse [69]

Answer:

malicious code

Please Mark Brainliest If This Helped!

7 0
3 years ago
What must devices that communicate with one another on the internet have in common?
Tomtit [17]

The most devices that communicate with one another on the internet have in common is Use the identical net protocols. Website IP addresses together with 74.125. 65.91 and 72.21.

<h3>What is the IP Address?</h3>

Every tool that communicates on the Internet, whether or not or not it's a non-public computer, a tablet, a smartphone, or something else, is assigned a completely unique figuring out range known as an IP (Internet Protocol) address.

Using the Internet, computer systems join and speak with one another, usually the usage of the TCP/IP (Transmission Control Protocol / Internet Protocol).

Read more about the internet :

brainly.com/question/1538272

#SPJ4

6 0
3 years ago
) What is the ""Phantom Inspector""? (
matrenka [14]

Answer:

 Phantom inspection is the process of finding various defects in the documents according to the . Basically, it is a group of meeting that usually provide the synergy effects and the maximum defects can easily be detected. This entire process is known as phantom inspector.  

It is also made some assumptions regarding the inspection that is made by one and more than one individual.

This process are usually done by inspecting the each operation output with the given output requirements.

4 0
3 years ago
Which four steps are needed to configure a voice vlan on a switch port?
OverLord2011 [107]
To configure a voice VLAN on a switch port, the following steps are to be taken:
1. Configure the swich port in access mode.
2. Add a voice VLAN. 
3. Assign the voice VLAN to the swith port.
4. Ensure that the voice traffic is trusted and tagged with a COS priority value. 
8 0
3 years ago
Other questions:
  • What is the advantage of using standards to develop and implement protocols?
    10·1 answer
  • Assume you're presenting to a live audience. What's the best set up for this audience configuration?
    14·2 answers
  • Special characters that display on the screen but do not print are called _____________
    15·1 answer
  • What is network and also how many types of network are there as well
    6·2 answers
  • 1. How do you identify the location of components and replacement procedures for notebook systems?
    6·1 answer
  • Mga halimbawa ng migrasyon​
    13·1 answer
  • Please help!! i need this asap &lt;3 <br> (the boxes have the same answer choices in both)
    7·2 answers
  • How todraw a status bar​
    9·1 answer
  • Jennifer has written a short story for children. What should be her last step before she submits the story for publication?
    6·1 answer
  • Adrian wants to run a digital movie clip that his friend shared with him through email. His system has 2 GB of RAM and 20 GB of
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!