1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksana_A [137]
3 years ago
15

Determine the “answer” to the formula according to the spreadsheet below: =A3 + B4 + D2.

Computers and Technology
1 answer:
Black_prince [1.1K]3 years ago
5 0

3 cells(A3,B4,D2) are adding using the formula in Ms Excel and show the addition result.


You might be interested in
You need to extract data from the system your predecessor created. you discover tables have been created according to the third
MissTica

Answer:

b. join

Explanation:

Correct answer:

Join: It allow join(paste) two tables by one or more commun columns

Example in the image attached

Bad answer:

Union: it only allow paste two tables with the same structure

select: it only allow get information from 1 table if not use join

having: it only allow get filtered information with a condition

4 0
3 years ago
The place where one printed page ends and the next page begins.
Nookie1986 [14]
It is a page break, because if you imagine all the pages underneath one another, it is quite literally where the line paper breaks and you end up on the next sheet
8 0
4 years ago
A search expression entered in one search engine will yield the same results when entered in a different search engine.
garik1379 [7]

Answer:

false

Explanation:

8 0
2 years ago
With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are
kirza4 [7]

Answer:

Phishing

Explanation:

Phishing is a social engineering attack where users are asked to respond to an email or are directed to a website where they are requested to login with their personal credentials, such as passwords or credit card numbers.

How Phishing Works?

The attacker first carefully designs a web page identical to a real bank with fine details. Then attacker persuades the victim to go to this fake web page with login screen. The attacker gets all the information typed and enter into that fake web page. The victim often thinks that this is exactly my bank's web page so nothing is going to happen if I put log in credentials.

How to avoid Phishing?

This kind of attack can always be spotted with one simple trick. Check the address of the web page carefully. The attacker can design the web page according to his wish but he cannot have control over the web address of a real bank or real a website.  

Some general safety tips are:

  • Don't open links from spam emails.
  • Don't download malicious software.
  • Don't share personal information with strangers
7 0
3 years ago
In a Java Script language. create a two-dimension array consisting of numbers representing costs. After creating the array, prin
Tanzania [10]

Answer:

Can you elaborate more?

Explanation:

5 0
4 years ago
Other questions:
  • Why is it important to evaluate the website on which you plan to shop?
    11·2 answers
  • What are some examples of lighter-than-air vehicles?
    10·1 answer
  • 5. Tricks of the language commercials use are called Rhetorical Devices?
    9·1 answer
  • A modern version of the BIOS firmware is called?
    12·1 answer
  • Generally considered to be the most important information security policies, what item below defines the actions a user may perf
    11·1 answer
  • Illusions in physcology​
    14·1 answer
  • Lazarus Consulting is a large computer consulting company in New York. Pete Lazarus, theà CEOà and founder, is well known for hi
    8·1 answer
  • If you entered data into row 4 and it should be in row 3, you should _____.
    8·2 answers
  • Project introduction​
    14·1 answer
  • A timer is set after each frame is sent before waiting an ACK for that frame, how long does the timer take to be expired?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!