1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nydimaria [60]
3 years ago
8

Which type of file can be used to import data into a spreadsheet?

Computers and Technology
1 answer:
Zanzabum3 years ago
4 0

.xlsx / .xls: standard Excel formats. .xlt: Excel template. .xlsb: an Excel format written in binary instead of XML, which allows for the saving of extremely large spreadsheets faster than standard formats. .csv: comma-separated value (as in the first import example used above; can be read by any spreadsheet program).


You might be interested in
Which option describes a balanced slide?
Umnica [9.8K]

Answer: a slide with a size 18 font and five images

Explanation:

the text isnt that big to overpower the images and vise versa

4 0
3 years ago
In every programming language, when you access data stored in an array, you must use a ____ containing a value that accesses mem
Juli2301 [7.4K]

Answer: this app allow  u to have answers made for students 5 star ap but there are some ads that get  in the way

Explanation:

but it is good

7 0
3 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
Ryan is the operations manager for a national financial company. His company is in the process of creating a customer handbook.
Nat2105 [25]

Answer:

Ryan first needs to determine his goals, in his case he is looking for a telecommunications technology that will often need to be updated and revised by others. Once he determines what he is looking for he can start gathering data, and once he's done that he can analyze his choices from the data he's gathered, in his case I would assume he'd be looking at either a wiki or a blog. Now it's time for Ryan to make his decision, I would go with a wiki since a wiki can be updated by many people in diverse locations. He said so himself that employees all over the country would be contributing to it so that is why I think a wiki would best suit him. Now that he's made his decision and can take a step back and evaluate what he has done and make sure he made the right choice.

Explanation:

:)

3 0
3 years ago
Task 7: The following is a quiz program that asks the us-
Leni [432]

Answer:

peread

Explanation:

7 0
3 years ago
Other questions:
  • What protocol allows us to use a domain name like .com instead of an ip address?
    6·1 answer
  • When viewing data entered into a spreadsheet, the columns identify _____.?
    5·1 answer
  • What is a sloper
    11·1 answer
  • Who can pick up GPS signals
    14·1 answer
  • We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 a
    8·1 answer
  • Which route of entry could chemicals use to enter through the body’s airways?
    8·1 answer
  • What is an important fact about databases?
    7·1 answer
  • What is the purpose of the Hide Slide feature in a presentation program?
    14·1 answer
  • kidede secondary school in Kotido district has been selected to participate in the final continental debating competitions with
    9·2 answers
  • Completar Fill in the blanks with the correct familiar commands. dar (negative) 1 of 1 Question 2 with 1 blank hacer (affirmativ
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!