1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qaws [65]
3 years ago
14

Joshua needs to join in two cells together which of the following would perform the function

Computers and Technology
1 answer:
irina1246 [14]3 years ago
7 0
=(Happy)&(Birthday) this is how it would be formatted 
You might be interested in
Engineers use science to ______ things that people use.
jek_recluse [69]

Answer:

Not 100% sure but I think it is either to solve things that people use or improve things that people use

Explanation:

8 0
3 years ago
Name a network device which would have to be
VMariaS [17]

Answer:

network interface card (NIC).

4 0
3 years ago
Feistel proposed that we can approximate the ideal block cipher by utilizing the concept of a __________ cipher, which is the ex
sweet-ann [11.9K]

Answer:

product cipher Is the answer

5 0
2 years ago
Read 2 more answers
What is the process called that determines how bits are represented on the medium?
Bad White [126]
The process that determines how bits are represented on the medium is called encoding. It is the process of converting a certain data into a particular format that is required for a certain processing need like program execution, data transmission or file conversion.
3 0
3 years ago
I.C.T
oee [108]

Soft and hard copies in my opinion

8 0
3 years ago
Read 2 more answers
Other questions:
  • Wi-Fi is all around us. Is there any downside to its pervasiveness?
    11·1 answer
  • Windows 7 is used to run ____ software
    5·2 answers
  • Different units of CPU ?
    12·1 answer
  • Invalid length parameter passed to the LEFT or SUBSTRING function (below)".
    6·1 answer
  • What is the function of the command prompt?
    8·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • Which of the following are breach prevention best practices?Access only the minimum amount of PHI/personally identifiable inform
    11·1 answer
  • A(n) ________ is an information system that works across national borders, facilitates communication between headquarters and su
    14·1 answer
  • Helppppppppppppppppppppppppppppppppp
    13·2 answers
  • Identify the correctly constructed ALTER TABLE statement to add a UNIQUE constraint to the column customer_number with the const
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!