1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRissso [65]
3 years ago
5

The cell address ZZ123 means

Computers and Technology
2 answers:
mafiozo [28]3 years ago
7 0
The range of cells from zz1 to zz23
uysha [10]3 years ago
3 0

Answer:

b.the cell located at the intersection of column ZZ and row 123.

Explanation:

confirmed on edge

You might be interested in
Is bit stuffing necessary in the control or address field in theHDLC protocol? why?
steposvetlana [31]

Answer:

Many network and communication protocols require bit stuffing for the following purposes: to avoid the interpretation of data as control information. For example, with six consecutive 1 bits, X.25 uses the bit stuffing,signal the beginning and end of a frame.

High-level Data link control (HDLC) is a bit-oriented protocol for point-to-point and multi-point communication.P/F bits are present in HDLC control field.

So,Yes bit stuffing is necessary in control field.

7 0
4 years ago
Solar power plants trap the sun’s energy and convert it into electricity. What is a problem associated with this technology?
mamaluj [8]
<span>Solar panels generate the most energy per square meter when they receive direct sunlight. However s</span>olar panels work also in cloudy weather, but not so effective.
On a cloudy day<span>, typical </span>solar panels can<span> produce 10-</span>25% of their rated capacity. SO, the problem associated with this technology is that t<span>his method will not work well on cloudy days. Correct answer: C</span>
4 0
3 years ago
List three ways of breaking a copyright law with the illegal copy of software.​
erma4kov [3.2K]

Answer:

  • Using it
  • Selling it
  • Giving it to someone.

Explanation:

Copyright law protects the unauthorized access to, reproduction and distribution of copyrighted material. The permission of the copyright holders is needed if any of these are to be done.

If copyrighted material is used without permission such as using software without buying it, that is illegal. If that software is sold or given to someone else, that is also illegal because it can only be distributed or redistributed by the copyright owners or people they have given access to.

4 0
3 years ago
The development of online capabilities created the ________, an information- and communication-based electronic exchange environ
Reil [10]

It should be noted that development of online capabilities created the marketspace, where an information- and communication-based electronic exchange is been done.

The digital market place  serves as the environment occupied by sophisticated computer and telecommunication technologies and digital offerings.

<h3>What is a marketspace?</h3>

marketspace can be regarded as a place where buying and selling takes place and this could be digital in nature.

Learn more about marketspace at;

brainly.com/question/11408596

5 0
2 years ago
Write a HTML program as shown in the output.​
Vitek1552 [10]

Explanation:

<html>

<title>first term 9/<title>

<head>SUNGHAVA SHIKSHA NIKETANA</head>

<body>

<h1>maths formula</h1>

<h6>a2-b2=(a+b)(A-B)</h6>

<h1>list of exams<\h1>

<h6>1.computer,2.english,3science</h6>

</body>

</html>

3 0
3 years ago
Other questions:
  • USB keys can store terabytes of data. Of the five key factors that contribute to the increasing vulnerability of organizational
    13·1 answer
  • A computer that delivers requested webpages to your computer or mobile device is a(n) _________.
    9·1 answer
  • PLEASE HELP ME ON THIS..............PLEASEEEEEEEEEEEE PLEASEEEEEE<br><br> ITTS EASYYYYYYYY
    12·1 answer
  • 1. Access and PowerPoint are not included in all configurations of Microsoft Office 2013.
    14·1 answer
  • Devon would like to install a new hard drive on his computer. Because he does not have a SATA port available on his motherboard,
    7·1 answer
  • This is for career exploration, I need help please! &lt;3 HELPPPP
    8·2 answers
  • A good practice when using public domain content is to
    7·1 answer
  • LAB: Convert to binary - methods
    11·1 answer
  • Write, in your own words, a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and
    10·1 answer
  • Where in PowerPoint should a user navigate to complete the tasks listed below?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!