1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
4 years ago
11

Which formula would you use to round the number in cell b5 to the nearest 10? is it a b c or d?

Computers and Technology
1 answer:
Mars2501 [29]4 years ago
7 0
B I'm not sure I'm in 4the grade are you talking about excel spreadsheet
You might be interested in
Who's YouTube creator?
snow_tiger [21]


ok there were more than one founders

chad hurley

jawed karim

and steve chen


YouTube was found in 2005 February the 14th

ok all of the founders or known as creators are those three men uptop

hoped his helped you

4 0
3 years ago
Read 2 more answers
.In Python, comments begin with the comment marker and continue ______.
earnstyle [38]

Answer:

b. to the end of the line

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

Python is a unique language compared to other languages such as Java and C++. In Python comments are started with the comment marker which is the hashtag (#) symbol and continues <u>to the end of the current line</u>. Once the line ends the next line is <u>NOT</u> automatically considered a comment unless another hashtag is placed.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
3 years ago
Which of the following best describes a balanced reaction
Ghella [55]

Answer:c

Explanation:

just took the test

7 0
2 years ago
if a hacker wants to exploit the TCP three-way handshake, what is the most effective way to go about it?
goldfiish [28.3K]

The most effective way to exploit TCP three-way handshake is TCP SYN flood.

  • SYN flood attack is simply a kind of computer attack that begins with 3-way TCP handshake.
  • TCP SYN flood is also called SYN flood and it is a type of distributed Denial of Service (DDoS) attack that uses every part of the normal TCP three-way handshake to eat up resources on the known server and render it non-functional
  • With TCP SYN flood, a hacker can eat up resources of target's computer and makes it unresponsive.

From the above, we can therefore say that the most effective way to exploit TCP three-way handshake is TCP SYN flood.

Learn more from:

brainly.com/question/14739766

7 0
2 years ago
Which action does not happen in each iteration of the repeat loop in the
iren2701 [21]

B. The number of sharks decreases. Explanation: hope it's help i learned about it and you too

7 0
3 years ago
Other questions:
  • To insert a new slide in an existing presentation, what menu should you select?
    5·2 answers
  • The purpose of a memo is to communicate directions, advice , or information true or false
    8·2 answers
  • If you have a charger that’s not from Apple, then could that damaged your iPhone or not?
    5·1 answer
  • What test is most similar to binary​
    9·1 answer
  • The loss of privacy data has implications:
    5·1 answer
  • python (Business: check ISBN-10) An ISBN-10 (International Standard Book Number) consists of 10 digits: d1d2d3d4d5d6d7d8d9d10. T
    12·1 answer
  • In cryptography, the term "Secret algorithm" refers to an algorithm designed in a way that prevents the examination of its inner
    12·2 answers
  • Write an application that displays the strings in the provided array alphabetically in ascending order.
    9·1 answer
  • How to use access?<br> like working in access and bringing tables and stuff
    5·1 answer
  • What is a personal data?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!