1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataly_w [17]
3 years ago
10

When protecting a worksheet all cells are locked by default.?

Computers and Technology
1 answer:
liq [111]3 years ago
3 0
Ys which means they can't be editted
You might be interested in
What would be an ideal scenario for using edge computing solutions?
VMariaS [17]

An ideal scenario for using edge computing solutions is when there is a  bad network connection  with IoT devices .

<h3>What is Edge computing ?</h3>

Edge computing can be regarded as the process that involves the  analyes as well as the, and storage of data closer to where it is generated .

This is been done to  enable rapid analysis and response in the process that is been used by some companies  to have consolidated operations , hence, An ideal scenario for using edge computing solutions is when there is a  bad network connection  with IoT devices .

Learn more about edge computing solutions on:

brainly.com/question/23858023

#SPJ1

3 0
1 year ago
FREE POINTS JUST ANSWER MY LATEST TWO QUESTIONS PLEASE
Mekhanik [1.2K]

Answer:

Look down below for answer!

Explanation:

1. The internet has backup files and a greater authoritative figure can easily see the history on the photo, etc. Some apps have save files no matter what and can track the post, photo, and when and why it was deleted. The impression the photo left on people may not be left either.

2. The zoo can be breaking the law because even though they store the information safely, they do not have the visitors consent to having their information.

7 0
3 years ago
Read 2 more answers
Write a program C statement to declare and initialize an array named afTest1 type float to store
Valentin [98]

Answer:

#include <stdio.h>

int main()

{

   float afTest1[5] = {90, 30, 25, 45, 55};

   for (int i = 0; i < 5; i++) {

       printf("%f ", afTest1[i]);

   }

   return 0;

}

Explanation:

Initialize the elements of the array as 90, 30, 25, 45, 55

Create a for loop that iterates through the array

Inside the loop, print each element using printf function

6 0
2 years ago
Your task is to identify three or more ways that big data is being collected on a regular basis, including one data collection m
attashe74 [19]

Answer:

Data is one of the most valuable resources today's businesses have. ... There are various data-gathering methods you can use with the help of your ... When it comes to data businesses collect about their customers, ... Third-party data offers much more scale than any other type of data, ... Big White Cursor.

Explanation:

4 0
2 years ago
Kitchen Gadgets
Scilla [17]

Answer:

hehe

Explanation:

7 0
2 years ago
Other questions:
  • . Reorder the following efficiencies from smallest to largest:
    9·1 answer
  • Which of the following actions might contribute to recommendations you see online?
    6·1 answer
  • What is information technology
    11·1 answer
  • Why bootable installer preparation is important? explain
    9·1 answer
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    9·1 answer
  • By convention only, either the first usable address or the last usable address in a network is assigned to the router (gateway)
    11·1 answer
  • We can create tables in MS. Word from *<br> 2 points<br> Insert Tab<br> Home Tab<br> Mailings Tab
    5·2 answers
  • HURRY please!!!!
    13·1 answer
  • Different he launc.<br>in function are available with MS-Excel<br>Many​
    14·1 answer
  • When a derived class method has the same name as a base class method, it is often said that the derived class method ________ th
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!