1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
3 years ago
5

You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step sho

uld you take next
Computers and Technology
1 answer:
vagabundo [1.1K]3 years ago
8 0

Answer:

The answer is "check the worksheet is not read only"

Explanation:

The read only mode is used for read the file data, and it doesn't allows the user to update the file, and for updating the worksheet we should check iut does not open in the read-only mode.

If it is open, then we close it and for close we goto the office button and click on the tools option after that goto general setting, in this there is a check box for turn off the read-only mode.

 

You might be interested in
Which actions did Sheila have to take to make the changes observed? Check all that apply.
Harrizon [31]

Answer:

Use

Explanation:

Out line view

6 0
3 years ago
An educational institution has a number of buildings in the campus. Each building has its own independent network system, and al
Aloiza [94]
Answer: star topology.

Explanation:

The layout of the way how the computers in a netword are interconnected is called network tipology.

Some types of network topologies are:

1) Point-to-point tipology: all the computers are connected to each other directly (computer-to-computer, in pairs, this is a direct link between each two computers).

2) Bus topology: all the nodes (computers or server) are connectect to a maing cable.

3) Star topology: all the computers are connected to a central computer or server which is called central hub. This is the layout described in the question.

4) Ring topology: the computers are connectec in a circular path; each computer is connected to the next computer.

5) Mesh: every computer is connected to every other computer.




8 0
3 years ago
Read 2 more answers
Research and identify at least five specialized search engines and their applications.
Varvara68 [4.7K]

Specialized search engines indexes content specialized by topic or location and are used to deliver more relevant results to the user. It indexes pages for particular topics. Examples of specialized search engines and their applications include;

1. Uquery.com – This new search engine focuses more on the emergence of iPhone and iPod touch applications

2. Taptu.com – A downloadable search engine that helps the user find items specific to fit on a mobile screen

3. Yahooligans – A sub-domain of yahoo that focuses on kid friendly games.

4. Pubmed.com – This is specifically meant for students in medical schools

5. Zillow.com – Online real estate service that provides information regarding home purchase.

5 0
3 years ago
The CPU's control unit retrieves the next instruction in a sequence of program instructions from main memory in the ______ stage
Varvara68 [4.7K]

Answer:

A. Fetch.

Explanation:

The fetch-decode-execute process of simply the fetch-execute process of the CPU are stages the CPU follow to process information and the switch state or shutdown.

The stages of this process is implied in its name, that is, the stages are fetch, decide and execute.

The fetch stage retrieves the next instruction from the memory.

The decode stage converts the clear text instruction set to electronic signals and transfer it to the appropriate registers.

The execute stage is the action carried out in the arithmetic logic unit.

5 0
3 years ago
Convert binary number 11101111.10111 to decimal
Alekssandra [29.7K]

Answer:

N_{10}=239.71875

Explanation:

In order to obtain the decimal number we have to use the next formula:

N_(10)=d*2^{(i)}\\where:\\N=real number\\d=digit\\i=position

(The position to the right of the decimal point we will take it as negative)

Using the formula we have:

N_{10}=(1*2^7+1*2^6+1*2^5+0*2^4+1*2^3+1*2^2+1*2^1+1*2^0+1*2^{-1}+0*2^{-2}+1*2^{-3}+1*2^{-4}+1*2^{-5})

N_{10}=239.71875

7 0
3 years ago
Other questions:
  • The likelihood of the occurrence of a vulnerability multiplied by the value of the information asset - the percentage of risk mi
    12·1 answer
  • A _____ is an electronic path over which data can travel.
    15·1 answer
  • In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-p
    15·1 answer
  • Given two double variables, best value and second best value, write some code that swaps their values. declare any additional va
    13·1 answer
  • Which does plug-and-play refer to?
    13·2 answers
  • Creating a call conversion in Google Ads and adding a phone snippet to a web page allows advertisers to use a Google forwarding
    11·1 answer
  • ap csp The local, remote, and upstream _______ can each have multiple ___ _____. When a participant in a collaborative group on
    5·1 answer
  • it just said i was blocked from brainly for a sec i was like- dang- then i logged in again then it was back to normal uHhHh can
    8·2 answers
  • Tommy loves taking care of homing pigeons. He sent a note to his crush who lives 24.0 km away from his house. These birds fly at
    9·1 answer
  • In java I need help on this specific code for this lab.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!