1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
musickatia [10]
3 years ago
9

What are the two types of formulas in excel

Computers and Technology
1 answer:
klasskru [66]3 years ago
5 0

Hi Lisa


Complex and simple


I hope that's help :)

You might be interested in
What format are a setups program file in before executed?
UkoKoshka [18]
.EXE as they are executable programs.  However, it depends on the operating system
6 0
3 years ago
Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofin
Ipatiy [6.2K]

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

4 0
3 years ago
What is a batch processing system
iogann1982 [59]
<span>A batch processing system is the execution of a series of jobs in a program on a computer without manual intervention</span>
4 0
3 years ago
The classic study by Longman and Baddeley, which involved the training of postal workers to perform a keyboarding skill, demonst
sweet-ann [11.9K]

Answer:

True

Explanation:

The classic study by Longman and Baddeley in 1978, which involved the training of postal workers to perform a keyboarding skill, demonstrated that distributed practice is better for learning than massed practice when it applies to the length and distribution of practice sessions.

8 0
3 years ago
Write short notes on a. Transaction Processing System (TPS)
posledela

Answer: A Transaction Processing System (TPS) is a type of information system that collects, stores, modifies and retrieves the data transactions of an enterprise. Rather than allowing the user to run arbitrary programs as time-sharing, transaction processing allows only predefined, structured transactions.

Three cycles: Transaction processing systems generally go through a five-stage cycle of 1) Data entry activities 2) Transaction processing activities 3) File and database processing 4) Document and report generation 5) Inquiry processing activities.

Explanation: hope this helps!

3 0
3 years ago
Other questions:
  • Match each career with the education required for each job
    12·1 answer
  • Well this isn't school related, but how do i watch dubbed and subbed anime for free on my computer?
    7·2 answers
  • How will you apply what you have learned in our topic today in a real life situation? Show your answers in the acronyms provided
    6·1 answer
  • Suppose that the domestic production of computer games creates enjoyment for those who play the games. Domestic production of co
    14·1 answer
  • You have been given the following String which represents a series of 6 side die rolls:rolls = "1,5,2,3,5,4,4,3,1,1,1,2,3,1,5,6,
    13·1 answer
  • A form letter can be customized by using different fields in a __________.
    15·2 answers
  • Plz help
    14·2 answers
  • Ian’s photography teacher asks him to take some photos of a few different species over the weekend. Which group of photos would
    12·1 answer
  • A user calls the help desk reporting that a laptop with Linux freezes on startup and displays kernel panic. What could cause thi
    12·1 answer
  • What is the best description of a programming language?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!