Answer: She sets an access password while saving the file. hope this helps!!!!
Explanation:
Answer:
They are used to identify your audience, craft messages and evaluate results. Communication Objectives are - as the name suggests – the process of setting targets for communication.Changing company or brand perceptions is another common communication objective.
Hope this helps! If so please mark brainliest and rate/heart to help my account
Answer:
The answer is given below in explanation section.
Explanation:
As asked in the question Sanford is creating an excel spreadsheet and needs to insert many workbooks sheets to organize his data, then what is the limit of the number of worksheets excel con contain.
The excel spreadsheet contains as many worksheets as you want but it is limited by the available memory of your computer and system resources. If you have very little memory then you cannot create many worksheets. If you have memory in GBs then you can create thousands of worksheets.
However, it is noted that to create the worksheet is not limited by Excel but it is limited by avilabe memory and system resources. If you have enough computer memory and resources like CPU power etc, then you can create worksheet as many as you want.
It is also noted that the excel worksheet is limited by its number of rows and number of columns it contains e.g. the total number of rows and columns on a worksheet are 1,048,576 rows by 16,384 columns.
If you want to study more about Excel limitation and specifications, the following link may help you
https://support.office.com/en-us/article/excel-specifications-and-limits-1672b34d-7043-467e-8e27-269d656771c3
Right click the text you want to format, On the home tab click the line and paragraph spacing command . A drop down menu will appear. Move the mouse over the various options . The line spacing will change in the document.
Was that helpful?
Answer: Requirements phase
Explanation:Requirement phase in the SDL(secure development life-cycle) is the phase where the security is fused with integrity part for any product. This mechanism is done to know about the requirement of the product in the security field. This is done to achieve the completeness in the product and to recover the mistakes that had happened earlier in the product due to security issues.
Other phase given in the option are for making the code, designing the model of product and testing the products aspects respectively.