1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Irina-Kira [14]
3 years ago
8

How to you put a color into a cell? a.Shading b.Fill c.Color d.Insert

Computers and Technology
1 answer:
Thepotemich [5.8K]3 years ago
6 0
The answer is c) Color 
hope i could help u
You might be interested in
Does anyone know why I get notifications on Brainly that say they are from 4 hours ago even though they were just answered
const2013 [10]

Answer:

Could be a glitch in the system

4 0
3 years ago
The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. For ma
Free_Kalibri [48]

Answer:

Check the explanation

Explanation:

1) supposing the keystream is a stream that is of random bits in Z26, we can describe a stream cipher based on the Latin Alphabet that is as follows (where A ↔ 0, B ↔ 1, C ↔ 2 etc):

y_{i} =x_{i} +k_{i} mod26

x_{i} =y_{i} -k_{i} mod26

2)

x_{i} =y_{i} -k_{i} = ” B ” − ” R ” = 1 − 17 = − 16 ≡ 10 mod 26 = ” K ” etc ·

The Decrypted Text is: ”KASPAR HAUSER”

8 0
3 years ago
What was the first video game ever invented
Sever21 [200]

Answer:

Pong

Explanation:

In 1958, a physicist created a tennis game in which he found the very first video game.

3 0
3 years ago
Read 2 more answers
Helpppp plsssss!!!<br><br>thanks.
sattari [20]
I believe the answer is A
6 0
3 years ago
Hi I m from India plz follow me and I will follow u​
erma4kov [3.2K]

Answer:

pok

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • When you purchase software in a box, reading the ________ is important to know if the software will function properly?
    13·1 answer
  • Which is a good plan for backing up data?
    6·1 answer
  • Which is said to be ‘computer on a chip’
    8·1 answer
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • We want to transmit 40 packets and the following packets are getting lost, 3,9, 25,28, 35. How many rounds are needed if
    5·1 answer
  • The 10 and 2 o'clock hand position on the steering wheel is no longer recommended because _____.
    13·1 answer
  • For C++ ONLY please,
    14·1 answer
  • Which 2 processes are operational processes
    10·1 answer
  • Search the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies.
    5·1 answer
  • Which artificial intelligence term is used to describe extracting information from unstructured text.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!