1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
3 years ago
7

Please list ten things that you have learned an Excel Spreadsheet can do.

Computers and Technology
1 answer:
Furkat [3]3 years ago
6 0

Certain things that MS excel can do are Tools, Calculators and Simulations, Dashboards and Reports with Charts, Automate Jobs with VBA macros, Solver Add-in & Statistical Analysis, Data Entry and Lists, Games in Excel

<u>Explanation:</u>

Microsoft Excel is a spreadsheet created by Microsoft for Windows, mac-OS, Android and iOS. It highlights computation, diagramming instruments, rotate tables, and a large scale programming language called Visual Basic for Applications.

Microsoft Excel is a spreadsheet program remembered for the Microsoft Office suite of utilization. Spreadsheets present tables of qualities orchestrated in lines and segments that can be controlled scientifically utilizing both essential and complex number-crunching tasks and capacities.

You might be interested in
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
enyata [817]

Answer:

a) true.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

On the other hand, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

<em>Hence, in cybersecurity the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. </em>

5 0
3 years ago
The following shared data structures must be declared as global variables such that they are shared by all threads
Elena L [17]

Answer:

what the heck

Explanation:

4 0
3 years ago
What do you mean by computer ethics?​
STALIN [3.7K]

Answer:

Computer ethics is a field of applied ethics that addresses ethical issues in the use, design and management of information technology and in the formulation of ethical policies for its regulation in society.

3 0
2 years ago
Major findings of evolution of computers
Elis [28]

Answer:

twitt

Explanation:

3 0
3 years ago
What ip class is this address: 128-191.255.255.255?
defon
Class B would be the correct answer.
4 0
3 years ago
Other questions:
  • 33 points!!!!!!!!!!pls help
    15·1 answer
  • Where can you place CSS statements in an HTML file?
    7·1 answer
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
  • FOR DIGITAL DESIGN/ PHOTOGRAPHY
    5·2 answers
  • Credence is a student in college.
    13·2 answers
  • To enforce the concept of separating class definition from its function implementations, where should the function implementatio
    14·1 answer
  • A corporate or government network that uses Internet tools, such as Web browsers, and
    13·1 answer
  • Which of the following lines of code would reduce the player’s gold by 100 coins?
    14·1 answer
  • Which of the following best describes a hotspot as
    10·1 answer
  • A packet switch has 5 users, each offering packets at a rate of 10 packets per second. The average length of the packets is 1,02
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!