1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
4 years ago
15

Select the correct answer. Which sign or symbol will you use to lock cells for absolute cell reference? O A. ampersand O B. aste

risk OC. dollar sign OD exclamation mark​
Computers and Technology
1 answer:
amm18124 years ago
8 0

Answer: b-asterisk

Explanation: PLATO

You might be interested in
Text that is positioned at the top of a column and labels the<br> column.
Vanyuwa [196]

Answer:

column header

Explanation:

3 0
3 years ago
True or false: A many-to-many relationship between classes A and B (where the maximum multiplicity on both sides of the associat
Gelneren [198K]

A many-to-many relationship between classes A and B (where the maximum multiplicity on both sides of the association is *) is implemented by posting foreign keys in both A and B is a false statement.

<h3>What is a many-to-many relationship?</h3>

A many-to-many relationship is known to be one that exist if one or more items that is found in one table can have an association to one or more items in another given table.

Hence,  A many-to-many relationship between classes A and B (where the maximum multiplicity on both sides of the association is *) is implemented by posting foreign keys in both A and B is a false statement.

Learn more about foreign keys from

brainly.com/question/17465483

#SPJ1

3 0
2 years ago
Union Carbide accident safety policies and procedures were not followed was due to
DedPeter [7]

Answer:

Defects in design, maintenance letdowns, lack of training, economy dealings, and blunders in operations.  

Explanation:

The design definitely was not appropriate, and there was lack in maintenance. Also there was lack of training, and blunders in operations. The project was not sound economically as well. And, you should know that problem arose due to water leakage. And that was due to mainly maintenance failure, which you can study in deep through Material Science. Lack of design is part of industrial design and others are part of management.

3 0
3 years ago
In Adobe Illustrator CC, you can open a new document by clicking New in the ____________menu or
Arturiano [62]

In Adobe Illustrator CC, you can open a new document by clicking New in <u>the file menu</u> or  pressing Cmd+N.

Explanation:

  • If you want to open a new document in Adobe Illustrator CC, you have to click on the File menu.
  • After you click on the File menu,
  • A drop-down list of options is available.
  • Out of the options displayed , you need to choose New option , which will open a new document.

<u>Alternatively, you can also use a keyboard shortcut for creating a new document. You need to press Cmd+N on the keyboard and a new document opens.</u>

<u />

3 0
3 years ago
What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
cestrela7 [59]

<u>Explanation:</u>

Note, a DoS (Denial of Service) attack is <u>different in scope from a DDoS (Distributed Denial of Service) </u>attack. In a DoS attack, the attack on the website's network comes from just a single source (IP address) repeatedly, while in a DDos attack several Ip addresses or sources attack the network of a website.

To trace the source of various types of packets used in a DoS attack (which of less complexity than a DDos attack), a software application like Wireshark could be used to measure trace the packets used in the attack.

4 0
3 years ago
Other questions:
  • Which of the following will affect the size of your monthly mortgage payment? A The size of your down payment B The length of yo
    5·1 answer
  • Sometimes we write similar letters to different people. For example, you might write to your parents to tell them about your cla
    9·1 answer
  • Which of the following documents specifies the uptime guarantee of a web server?A. Due processB. Due diligenceC. Scope of workD.
    7·1 answer
  • Consider a bit stuffing framing method where the start of a frame is indicated by 6 consecutive ones, followed by 2 zeroes. What
    8·1 answer
  • Gathering information with your eyes is called
    13·2 answers
  • Given that n refers to a positive integer, use a while loop to compute the sum of the cubes of the first n counting numbers, and
    12·1 answer
  • What is an undirected graph?
    13·1 answer
  • 16. Budget Analysis Write a program that asks the user to enter the amount that he or she has budgeted for a month. A loop shoul
    14·1 answer
  • Can use some help with Computer Networking, with a focus on routing protocols. Part A: Which of these routing protocols is the o
    5·1 answer
  • A form of segmentation that is based on user usage rate, user status, purchase occasion, and benefits sought is _________.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!