1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
3 years ago
10

When pasting a circle drawn by the presentation software drawing tool into a spreadsheet, that circle will go into the selected

cell in the spreadsheet.
(Points : 2)
True
False
Computers and Technology
2 answers:
ivann1987 [24]3 years ago
6 0
The answer is ............................ False
mylen [45]3 years ago
4 0

the answer is false!!!!!

i took quiz

good luck

You might be interested in
The file command provides information about any file system object (i.e., file, directory or link) that is provided to it as an
NeTakaya

Answer:

The answer is "Option a, c, and d".

Explanation:

This command aims to define the argumentation from each entity of the file system like a disc, path, or link. It checks the usage of a measurement system, which is requested to collect the information from either the inode of the item, the description of the option as follows:

  • In option a, It is used to identify the file type.
  • In option c, This command is used to list all file types.
  • In option d, This command is used to list all the current directories.
  • In option b, It is used to describe a single entity directory.
7 0
3 years ago
Cuantos días tiene un año
Arte-miy333 [17]

Answer: 365 dias

Explanation:

4 0
2 years ago
A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successf
prohojiy [21]

Answer:

The following options are true.

Explanation:

A corporation has requested the user to support minimize the brute force attacks on credentials of their Microsoft account holder's. They effectively eliminated the malware involved in those assaults and have to protect their credentials allocated towards their user profiles properly without restricting the usefulness of the program.

The following should be included in securing the user accounts are need credentials for the user profile, create logon constraints that failed as well as need powerful credentials.

7 0
3 years ago
Is it possible to hack a network through a game that is being played on that network?
Nadusha1986 [10]

Answer

yes,

it is possible to hack a network through a game that is being played on that network.

a network can be hacked through a game which is played on that network

hackers are gurus they can hack any network if they have access to that network.

and access to a network can be gained by playing a game on that network.

5 0
3 years ago
Create a function called notBad that takes a single argument, a string.
igomit [66]

Answer:

The Following are the method definition to this question:

def notBad(s):#defining a method notBad that take s variable as parameter

   if 'not' not in s or 'bad' not in s: # defining If block that checks "not or bad" is not in the string

       return s#return string value

   n= s.index('not')#defining n variable that store index value of not

   b= s.index('bad')#defining b variable that store index value of bad

   if n<b:#defining if block that compare n and b value  

       return s[:n]+'good'+s[b+3:]#use slicling for remove value and add another value

print(notBad('This dinner is not that bad!'))#call method and print value

print(notBad('This movie is not that bad!'))#call method and print value

print(notBad('This dinner bad!'))#call method and print value

Output:

This dinner is good!

This movie is good!

This dinner bad!

Explanation:

In the above given, method definition a method "notBad" is defined that takes variable "s" as a parameter, which is used for input the string value.

In the next step, an if block, is defined, that checks in string value "not or bad" are not available in the input string. if the condition is true, it will return, that string value.

In the next line "n and b" variable has defined, that store "not and bad" index value, and use if block that the come to its value and use slicing to re remove its value.

3 0
3 years ago
Other questions:
  • April 107 90 29 31 66 0.344
    8·1 answer
  • What type of coverage pays for damage incurred as a result of theft, vandalism, fire or natural disaster?
    15·1 answer
  • An address has a house number, a street, an optional apartment number, a city, a state and a postal code. Define the constructor
    5·1 answer
  • Agile Software Development is based on Select one: a. Iterative Development b. Both Incremental and Iterative Development c. Inc
    11·1 answer
  • Your classmate is frustrated because the code that was designed to add up her five quiz grades is not working properly.
    12·1 answer
  • Truth or dare????????????
    5·1 answer
  • One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed.
    13·1 answer
  • What is the difference between a LAN and WAN? how do these two networks interact?​
    14·1 answer
  • How do people decide their ethical behavior
    13·2 answers
  • What would the input, process, outcome and feedback be for a class assignment
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!