1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rufina [12.5K]
3 years ago
15

An electronic spreadsheet is a type of archive. database. document. periodical.

Computers and Technology
2 answers:
zhenek [66]3 years ago
7 0

Answer:

The answer is "database"

Explanation:

The spreadsheet is an application program, that is used to organized, analysis, and store data in tabular format. It is also used to import data and provide a database in programming that is used to store data and other option is not correct that can be described as follows:

  • Archive uses VBA that stands for "Visual Basic for Applications", it is used to store data in an archive file, that's why it is not correct.
  • Document is a file that is used to store data, that's why it is not correct.
  • Periodical use graph and bar charts to display data graphically, that's why it is not correct.

zmey [24]3 years ago
5 0

Answer:

databases

electronic archives

online libraries

spreadsheets

You might be interested in
A nurse is reviewing the different cloud office applications available. When comparing the iCloud to other cloud office applicat
hoa [83]

Answer:

A nurse should have to consider a

  • web browser to access the app
  • the app is not a downloadable type

Reasons have explained in the explanation.

Explanation:

All apps can find a copy of the phone's web browser in the app drawer. Google Chrome is the name of Google's browser that can use for reviewing the different cloud applications.

A Web application is  stored on the server and over the internet through an interface.

She should have to use these features.

8 0
3 years ago
For this exam review lab exercise, you will develop a program that fixes faulty data in a one-dimensional array of integers. Fau
Paladinen [302]

Answer:

start with what you know

Explanation:

3 0
3 years ago
Please answer these questions correctly!
Tatiana [17]

2-Matematical principle

3-Measuring desorder and randomness

4-Mass production methods were an important part of the industrial Revolution

8 0
3 years ago
23. Which of the following CANNOT be used to represent positive and
Sloan [31]
Jeonrirofknrjricjfbrbirn entire
5 0
3 years ago
A type of security control that takes measures to help restore a system is referred to as:
vovikov84 [41]

Answer:

C.  corrective

Explanation:

Security controls

These are actions or measures taken to maintain and/ or restore the security of the system. Security controls are categorized as corrective, preventive and detective, which are discussed below.

Corrective

Security controls which help in taking the corrective steps after the malicious activity has done damage to the system or restoring the security of the system are called corrective security controls.

These controls also act as preventive measures for future risks.

These controls perform the healing and have remedial action for the damage done to the system.

Once the system has been recovered, appropriate measures are put in place to avoid further damage.

The damage can be done to the computer system, its hardware and software resources or the data.

Examples include restoring the database from the backup file.

Updating or renewing antivirus software rectifies the security against virus.

For example, once the database has been restored, access control, antivirus and other measures are employed to prevent the database from being corrupted and to prevent system from being affected.

Preventive

Security controls which help in stopping the malicious activity from harming the system are called preventive security controls.

As per the name, these measures are employed to prevent any security breach.

These measures prevent any suspicious activity from taking place which may cause harm to the system.

Firewalls prevent unauthorized access.

Antivirus prevents malicious applications from running.

Login feature to give access only to authorized user.

Detective

Security controls which help in detecting the malicious activities and alerting the security personnel are called detective security controls.

As per the name, these measures are used to identify any suspicious activity and report them. Detective controls do not prevent or correct any security breach.

Alarms are employed to detect and alert any suspicious activity.

Intrusion detection system (IDS).

In an ideal situation, security controls are a combination of all the types mentioned above.

4 0
3 years ago
Other questions:
  • Jeff wants to print quickly so he presses the Ctrl and the P. Jeff used a _____. macro invoice template shortcut
    15·1 answer
  • To add text to a slide when using presentation software, you need to add a text box. To add a text box, click the Text Box butto
    8·2 answers
  • A blog is Group of answer choices a character in Lineage,
    15·1 answer
  • Which area of a magazine cover is often important for those shops and stalls that cannot display the entire cover page on a stan
    15·1 answer
  • Which securities protects networks from intruders? *
    9·1 answer
  • A studio camera is generally small and lightweight enough to be taken out into the
    11·1 answer
  • Assume that you have 22 slices of pizza and 7 friends that are going to share it (you've already eaten). There's been some argum
    9·1 answer
  • What technique is used when setup times at a workstation are sequence dependent?
    15·1 answer
  • Write an algorithm to find the area of a circle of radius r
    5·1 answer
  • A Social agency hires Accenture to improve training and experiences for caseworkers. What is one way Accenture can use Virtual R
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!