1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalka [10]
3 years ago
7

What feature could you use to automatically shade cells containing a negative value in red?

Computers and Technology
2 answers:
klemol [59]3 years ago
5 0
D correct if wrong and can u help me?????!?!?!? its..... URGENT!!!!!!!!!!!! and i hope we can be friends
garri49 [273]3 years ago
3 0

Answer:

Conditional Formatting

Explanation:

verified from actual book

You might be interested in
What do u think a creative app must have? <br><br> Please answer the question ASAP!!
jarptica [38.1K]

Answer:

  1. Responsive
  2. Identifies a Target Demographic
  3. Encourages User Engagement
  4. Beautiful UI Design
  5. Follows Platform Design Gipuidelines
  6. Use of Familiar Screens
  7. Functionless Navigation Feature

Explanation:

ÔwÔ

3 0
3 years ago
How to disable Fortinet?
Anni [7]

Answer:

Click on the start menu and go to the control panel. Video of the Day.

Click "Programs and Features" to launch the programs and features window.

Scroll down the window, click "Fortinet Antivirus," and then click the uninstall button.

Explanation:

8 0
2 years ago
Which is a description of phishing?
kodGreya [7K]

Answer:

C. sending emails impersonating legitimate companies in an attempt to learn a recipient's personal information

7 0
3 years ago
You are the IT administrator for a small corporate network. You have installed the Windows Server 2016 operating system on a ser
Elan Coil [88]

Answer:

In this lab, you perform the following tasks:

• On Disk 1, create a mirrored volume of the System (C:) volume to add fault tolerance.

• Using Disk 2, Disk 3, and Disk 4, create a RAID 5 volume that provides both fault tolerance and improved performance using the following settings:

o Volume size: 2 TB

o Drive letter: R

o Format: NTFS

o Volume label: Data

Complete this lab as follows:

1. Mirror an existing volume as follows:

a. Right-click Start and select Disk Management.

b. Click OK to initialize new disks.

c. Maximize the Disk Management window to better view the volumes.

d. Right-click the System (C:) volume and select Add Mirror.

e. Select Disk 1 that will be used for the mirrored copy.

f. Select Add Mirror.

g. Click Yes to convert the basic disk to a dynamic disk.

2. Create a RAID 5 volume as follows:

a. In Disk Management, right-click a disk with free space and select New RAID 5 Volume.

b. Click Next.

c. Under Available, holding down the Ctrl key, select Disk 3 and Disk 4 to be part of the new volume with Disk 2.

d. Select Add.

e. Click Next.

f. From the drive letter drop-down dialog, select R; then click Next.

g. Make sure that NTFS is selected as the file system.

h. In the Volume label field, enter Data.

i. Select Next.

j. Click Finish to create the volume.

k. Click Yes to convert the basic disk to a dynamic disk.

Explanation:

5 0
3 years ago
Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approxim
Marysya12 [62]

Answer:

a. 0.01

b. 0.001

c. The identification field of the packet fragment can be used to uniquely identify and collate the fragments lost in transmission.

Explanation:

The probability of losing a packet is 10% or 0.1, so the probability of losing the packet twice during transmission;

= 0.1 x 0.1 = 0.01

When any fragments have been part of the transmission, the probability of the packet is dependent on the fragments;

= 0.01 x 0.1 = 0.001

The identification field is a unique 16-bit value assigned to an IPv4 packet, when a packet is fragmented for transmission, its field is used to collate the unique fragments in the packet.

6 0
3 years ago
Other questions:
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • What are the problems with security when working on a Web Page?
    13·2 answers
  • Software referd to the physical parts of the computer True or False
    9·2 answers
  • What is an identified component of a software program that might allow a hacker or other intruder to gain entry and control of a
    10·2 answers
  • man who is colorblind marries a woman who has normal color vision and is not a carrier of color blindness. If this couple has a
    15·1 answer
  • How to solve a program that accepts a number as input and prints just the decimal portion
    15·2 answers
  • Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to
    8·1 answer
  • Two of the major sources used today for obtaining information to create computer maps are satellites and _____________.
    11·2 answers
  • Consider the following code segment.
    5·1 answer
  • Select the correct answer.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!