1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
4 years ago
13

Match the items with their respective descriptions

Computers and Technology
2 answers:
dem82 [27]4 years ago
7 0

A,B,C denotes column headers.

Sheet1, sheet 2, sheet 3 denotes worksheets.

1,2,3 denotes row numbers.

C5 denotes cell addresses.

Let me know if you have any questions.

MariettaO [177]4 years ago
7 0

Answer:

The correct answer is:

"A, B, C = denotes column headers"

"sheet 1, sheet 2, sheet 3 = denotes worksheets"

"1, 2, 3 = denotes row numbers"

"C5 = denotes cell addresses"

Explanation:

Column headers may be labelled by alphabetic order in Microsoft Excel and Google spreadsheets, for example, and that is why it denotes "A, B, C". Worksheets may be labelled by numbers, for instance Microsoft Excel worksheets which denote "sheet 1, sheet 2, sheet 3". Row numbers are followed one after the other and always in simple order, that is why it denotes "1, 2, 3". Cell addresses are the matching of letters and numbers in a spreadsheet which inform a specific cell adress, for instance "C5".

You might be interested in
When mapping a drive, you can type in the path to the shared folder on the host computer. what is the syntax for the path?
fomenos
For SMB:  \\server\path\to\share
For CIFS: //server/path/to/share
3 0
4 years ago
The
saveliy_v [14]
The answer is Undo I think
4 0
3 years ago
Read 2 more answers
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
Which osi layer is responsible for directing data from one lan to another?
likoan [24]
The Network layer (1) directs date from one LAN to another.
5 0
4 years ago
You need to include the _____ directive in your program in order to use the time function.
PtichkaEL [24]
From Google:

"<span>a built-in C++ function that returns the current time(according to your computer system's clock) as seconds elapsed since midnight on January 1, 1970; often used as the seed argument in the srand function; a program that uses the time function must contain the #include <ctime> directive"

I hope this helps you with your question</span>
4 0
3 years ago
Other questions:
  • What is the point of having bullets points in a text box
    11·1 answer
  • Design a 4-to-16 line Decoder by using the two 3*8 decoder-line decoders. The 3-to-8 line decoders have an enable input ( '1' =e
    13·1 answer
  • When considering the best technology for its particular use what should a business consider
    8·2 answers
  • Rita wants to know the size of each image in a folder. Which view will help her find this information quickly?
    13·1 answer
  • When the amount of storage data is big, and we need the searching and insertion must be very fast, which kind of data structure
    9·1 answer
  • In C++ please.
    8·1 answer
  • How many times does the following loop execute?int upperCaseLetters = 0;String str = "abcdEfghI";boolean found = false;for (int
    5·1 answer
  • Edhesive assignment 4
    14·1 answer
  • Which feature is used to help identify the appropriate content for particular form fields?
    9·1 answer
  • Denise found a volume of documents in the trash bin that contained individuals, names, social security numbers and years of birt
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!