1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arsen [322]
3 years ago
5

1. row a statement you submit to get paid for a product or service 2. spreadsheet software used by many business professionals t

o work with numbers 3. data a built-in formula in a spreadsheet 4. template information that is stored 5. function a horizontal set of data in a spreadsheet 6. invoice a file that serves as a starting point for a new document
Computers and Technology
1 answer:
Ivenika [448]3 years ago
6 0

Answer:

1. row a horizontal set of data in a spreadsheet  

2. spreadsheet software used by many business professionals to work with numbers  

3. data information that is stored  

4. template a file that serves as a starting point for a new document

5. function a built-in formula in a spreadsheet

6. invoice a statement you submit to get paid for a product or service

Explanation:

The correct matches have been mentioned in the answer section. Certainly, a row is the horizontal set of data is a spreadsheet. And other options are self-understood. And hence, it is self-explanatory.

You might be interested in
HOW CAN A PERSON GET BENEFITTED BY THE ICT BASEDSERVICES PROVIDED BY GOVERNMENT
BARSIC [14]

Answer:

Explanation:

It aims to transform the entire ecosystem of public services through the use of information technology.ICT holds particular promise in areas of governance and public participation.  Age can use information to reduce corruption and increase government transparency, accountability, efficiency and so finally gud night guys and take care.

plz mark as brainliest

5 0
3 years ago
Which computer was the first to use GUI and icons?
Natalija [7]
I think it was A) Mac.
5 0
3 years ago
science and technology are interdependent advances in one lead to advances in the other. give an example of this phenomenon.
goblinko [34]
Wouldn't it Be Stem ? 
Science 
technology
Engineering 
Mathmatics 
5 0
4 years ago
How are companies protecting their users from internet assault
cluponka [151]

Answer: Companies and organization are taking several steps to secure their user from internet abuse  .The methods are mentioned as follows:-

  • Offering security technologies in the form of package along with the service so that the protection resource is not required to be installed or bought from elsewhere such as antivirus technologies.
  • Using the web servers that are available with high security features
  • Using the websites that persist the built-in feature of giving virus or malicious interruption warnings so that user can become alert
  • Making users aware about internet abuse and provide information so that they can identify such happening in the service.

4 0
4 years ago
You company has decided to start using AppLocker GPOs to control application access. Jeff, Stormwind’s IT Manager, would like to
miv72 [106K]

Answer:

In the Group Policy Manager, enforce the new AppLocker policy in Audit Only mode.

Explanation:

The organization has chosen to run employing AppLocker GPOs to secure access to applications. Jeff, the Information Technology Manager at the following company, also wants to evaluate the AppLocker strategy until it is implemented.  

So, In Group Policy Manager, Jeff enforces the latest AppLocker strategy to evaluate the AppLocker policy in the Audit-Only zone because he is the IT manager of the company and he wanted to check the following policy.

3 0
3 years ago
Other questions:
  • How can volunteering to help plan a fundraiser for your team or club be a way to develop your strengths?
    10·2 answers
  • para que sirve los siguientes sistemas operativos : a. Windows 10 b. Apple yosemite c. linux Ubuntu d. Android marshmallow e. IO
    9·1 answer
  • When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmis
    14·1 answer
  • When nat hides the source ip of an originating device, this is known as ________?
    15·2 answers
  • Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
    8·1 answer
  • What is a two content slide​
    7·1 answer
  • Is the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfa
    10·1 answer
  • Name the box where the name of the first cell of the selected range appears?
    7·1 answer
  • List any three importance of computer​
    14·1 answer
  • Which best describes what happens when a formula is copied from one cell to another?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!