1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergey [27]
3 years ago
10

What naming scheme identifies the rows in a worksheet?

Computers and Technology
2 answers:
Nezavi [6.7K]3 years ago
8 0

Answer:

<u><em>[B]</em></u><em> What naming scheme identifies the rows in a worksheet?</em>

Answer Choices:

<em>[A]</em><em> A, B, C </em>

<u><em>[B] 1, 2, 3 </em></u>

<em>[C]</em><em> A1, B1, C1 </em>

<em>[D] </em><em>1A, 1B, 1C</em>

Explanation:

<em><u>Rows</u></em> are identified numbers; <em><u>Columns</u></em> are identified by letters.

Example:

<em>Cell is A3, that means the cell is in column A and row 3.</em>

masha68 [24]3 years ago
7 0
The naming scheme that identifies the rows in a worksheet is B. 1, 2, 3.
Rows are horizontal, and they are identified by numbers in an Excel worksheet. On the other hand, columns are vertical, and they are identified by letters in the same Excel worksheet. 
You might be interested in
What job titles describes a person with green engery? in career clusters
Amiraneli [1.4K]

Answer:

environmental scientist

Explanation:

8 0
3 years ago
Can you think of a situation that might create a problem for a website’s security? What could a back-end developer do to prevent
Yuki888 [10]

A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Others are;

  • Lack of authentication in company security.
  • Access control-linked misconfigurations.
  • A Software misconfigurations.

<h3>What could a back-end developer do to prevent this situation from occurring?</h3>
  • Always Encrypt sensitive data:
  • Do not use weak encryption algorithm.

The back end in cyber security is know to be a sort of a kind of a repository of all that entails your web presence and also that of your mobile apps and it is one that makes it to run smoothly.

Hence, A situation that might create a problem for a website’s security is known o be  as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.

Learn more about website’s security from

brainly.com/question/10450768

#SPJ1

4 0
2 years ago
Hardware parts with images​
Inessa [10]
There is nothing here I’m sorry that I can’t hel
6 0
2 years ago
Read 2 more answers
Write a multi-way if/else statement that adds 1 to the variable reverseDrivers if the variable speed is less than 0, adds 1 to t
andriy [413]

Answer:

Code in Javascript.

<u>Preconditions: </u>

All the variables are defined and initialized.

if (speed < 0) { <em>// if speed is < 0 then adds 1 to reverse drivers.</em>

   reverseDrivers ++;

} else if (speed < 1) {  <em>// else if speed is < 1 then adds 1 to parked drivers.</em>

   parkedDrivers ++;

} else if (speed < 40) { <em>// else if speed is < 40 then adds 1 to slow drivers.</em>

   slowDrivers ++;

} else if (speed <= 65) { <em>// else if speed is <= 65 then adds 1 to safe drivers.</em>

   slowDrivers ++;

} else { <em>// else if speed is > 65 then adds 1 to speeders.</em>

   speeders++;

}

4 0
3 years ago
Because all devices accessible to the Internet must have public IP addresses, changing providers often means going through a ted
Illusion [34]

Answer:

Renumbering

Explanation:

Renumbering a network consists of changing the IP host addresses, and perhaps the network mask, of each device within the network that has an address associated with it.

8 0
3 years ago
Other questions:
  • Supplementary content SC is usually an important part of a webpage (but is not required for a page to receive a high or even hig
    7·1 answer
  • What the address for dns server that the eorkstation will use?
    10·1 answer
  • Which layer includes the physical transmission medium (cables or wireless media) that any network must use to send and receive t
    8·1 answer
  • write the algorithm, flowchart and BASIC program to calculate the area of the rectangle length 50m and width 30m.​
    8·1 answer
  • Which of the following things could you do in order to tell if a pair of colors has strong contrast? A. Look at the colors on th
    12·1 answer
  • Please help!
    10·2 answers
  • What is the difference between paper size and page margins in word
    5·2 answers
  • 3. Write a program that has the user enter two Strings. Display whether the first String is less than (comes first alphabeticall
    11·1 answer
  • Is a pocket watch consider a computer
    15·1 answer
  • Full form of DVX please answer fast ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!