1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
7

What types of data are commonly entered into a cell ?

Computers and Technology
2 answers:
natta225 [31]3 years ago
6 0

Answer:

A. numbers

Explanation:

If you are referring to excel, that is the type of data that is usually typed on a spreadsheet.

Kryger [21]3 years ago
6 0
The answer is A. Numbers
You might be interested in
Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
tatuchka [14]

Answer:

An HTTP Header attack

Explanation:

In web applications an HTTP refers to Hypertext Transfer Protocol and an HTTP Header is the value that is displayed in  a request or response message, the header has a name and a value separated by a colon.

An HTTP header attack called an header injection is a vulnerability that is present when users' inputs are required for the dynamic generation of HTTP headers. This vulneraility allows several security threats to be carried out, some examples are:

  1. Malicious site redirection
  2. Cross-site scripting, and
  3. Session fixation through the set-cookie header
8 0
3 years ago
The average price of milk increased from $3.00 last year to $3.50 this year. This is most likely due to:
Natali5045456 [20]

Answer:

High Demand

Explanation:

If more people want to buy something the price will likely go up.

4 0
3 years ago
A laptop computer manufacturer would consider the computer's processor chip to be a(n) ______ cost.
erastovalidia [21]

Answer:

direct material

Explanation:

if you need anymore help let me know

3 0
2 years ago
Which of the following statements are true?
grin007 [14]

Answer:

I think the answer are two which are B and C

7 0
3 years ago
How do you handle sensitive data?
arlik [135]

  1. <em>Take stock. Know what personal information you have in your files and on your computers.</em>
  2. <em>Scale down. Keep only what you need for your business.</em>
  3. <em>Lock it. Protect the information that you keep.</em>
  4. <em>Pitch it. Properly dispose of what you no longer need.</em>
  5. <em>plan </em><em>ahead</em>

<em>hope </em><em>it</em><em> helps</em>

7 0
3 years ago
Other questions:
  • Which computer device works like the human central nervous system by connecting all the computer’s parts together and allowing t
    9·1 answer
  • What is the software called that allows the user to create, access, and manage a database? question 8 options:
    10·1 answer
  • Which routine is configured to be called by another routine?
    10·1 answer
  • To increase the view of a document on the screen, use the _____. View icon Zoom slider full-screen reading boldface font
    9·1 answer
  • Which type of CPU instruction performs arithmetic calculations and stores the results in memory?
    14·2 answers
  • A web application is an example of:
    7·1 answer
  • The construction of a mixed media assemblage would be considered
    9·1 answer
  • What keyboard functions lets you delete words
    9·2 answers
  • Please help thank u!!!!!
    13·2 answers
  • If you select one slice of pie in a pie chart, you have selected a ____
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!