1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kow [346]
3 years ago
6

Buenas , ayudenme con esta tarea de excel 2016

Computers and Technology
1 answer:
arlik [135]3 years ago
8 0

Get google to help you.

ok.??

You might be interested in
Naruto Uzumaki who likes naruto ??? who waches it??
nika2105 [10]

Answer:

me

Explanation:

naruto is the coolest dude

6 0
3 years ago
Read 2 more answers
Type the correct answer in the box. Spell all words correctly.
Kamila [148]

Answer:emphasis

Explanation:

7 0
3 years ago
Musccanic Inc., a company that manufactures microprocessors, updates the technology used in its microprocessors once every four
ELEN [110]

Answer:

S-curve pattern of innovation.

Explanation:

Based on the information provided with regards to Musccanic Inc.'s microprocessor production cycle, it can be said that this scenario illustrates the S-curve pattern of innovation. This term refers to the slow rise in profits as a product enters a market, then the rapid rise as it hits its maturity stage, and then the decline as it reaches the end of it's life cycle, usually when an updated version is going to be released. Which in this scenario is every 4 years when a new microprocessor is going to be released.

If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
In response to an alert regarding a possible security incident, you are analyzing the logs for a web application. In the process
SOVA2 [1]

The type of attack was most likely attempted against the application is an  XSS attack.

<h3>Why is the above an  XSS attack?</h3>

This attack is known to be an example of an XSS attack as it is one that is often recorded by the log of a web server's log.

Conclusively, Note that in this attack, if you see the HTML encoding, one can say that is mainly an XSS attack but when you see SQL or XML statements in the string, then it is another.

Learn more about attack from

brainly.com/question/76529

#SPJ1

4 0
2 years ago
What best describes the kinds of online items that are usually protected by copyright law?
Sergeu [11.5K]

technically, anything that is copyright protected. but the answer that best describes the kinds of online items that are usually protected by copyright law?  the answer is D. Most media work that is available for money


Hope this helps!

-SchoolIsBlaaa

7 0
3 years ago
Other questions:
  • Array elements must be ________ before a binary search can be performed.
    8·1 answer
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • In general, font size for software-generated presentation slides should be no smaller than __________ points.
    8·1 answer
  • Which of the following occupations is the most likely o require working weekends and night shifts
    11·2 answers
  • In which country did the World Cyber Games originate?
    9·2 answers
  • Which of the following is a potential hazard
    12·2 answers
  • Find the names of these cities with temperature and condition whose condition is neither sunny nor cloudy.
    15·1 answer
  • You have learned a lot about the types of careers that are involved with building a playground. Create two job descriptions of p
    7·2 answers
  • You designed a program to find the midpoint of two points. Which step below corresponds to finding the average of the x-coordina
    15·1 answer
  • A brief contains an initial definition statement of the design aim and defines any constraints?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!