1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
statuscvo [17]
3 years ago
6

1. An Excel file is called a workbook? A) True B) False

Computers and Technology
2 answers:
pickupchik [31]3 years ago
6 0
B) False. Hope this helped!!
RoseWind [281]3 years ago
3 0

Answer:

B) False

Explanation:

it's called Worksheet

You might be interested in
How do social media sites illustrate kindness?
xeze [42]
There are many ways it cna illustrate kindness, such as making friends with friendly people, keeping long distance relationships possible, raising awareness of an event
5 0
3 years ago
Evaluate and compare free and commercial versions of the Avast antivirus software
Ivan

Answer:

Explanation:

Explanation:

Explanation:

Explanation:

Explanation:

Explanation:

8 0
2 years ago
In photoshop what should you consider when determining a projects purpose and objectives?
Darina [25.2K]

Answer:

Identify the purpose, audience, and audience needs for preparing image,Identify three phases that might appear in a project plan. When planning your design project you might include on an outline the goals.

4 0
2 years ago
An access control system that grants users only those rights necessary for them to perform their work is operating on which secu
solmaris [256]

Answer:

B. Least privilege                

Explanation:

  • The principle of least privilege an important principle in computer security.
  • It limits the access rights for users and only grant them with the rights that are sufficient for them to perform their required task.
  • For example a user is granted privilege to execute a file or manipulate data or use only the resources that are required for them to perform a particular task.
  • This principle can be used only to limit and control access rights to system resources and applications.
  • The least privilege is beneficial as it reduces the risk of unauthorized access.
  • For example a user whose task is data entry and has nothing to do with controlling access or granting access rights to users, will only be allowed to enter data to the DB by the principle of least privilege.
7 0
3 years ago
Chat messages are most likely to be found where on a computer? firewall nic internet history ram
miv72 [106K]
<span>The answer is RAM.  Chat messages are most likely to be found in the RAM of the computer.  It is Random Access Memory.  </span><span>RAM is considered volatile memory, which means that the stored information is lost when there is no more power.</span>
3 0
3 years ago
Other questions:
  • Image below please help
    9·1 answer
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    7·1 answer
  • What is the binding time for the following in C/C++ program. Explain. a. The location of memory of a local variable in a functio
    9·1 answer
  • William found out that someone used his report on american culture without his permission. what is william a victim of?
    11·1 answer
  • How can a professional association help you reach your career goals?
    5·1 answer
  • To save a file so that it can be opened on most computers, select the ____ option.
    10·2 answers
  • Where in an email would u find information about the action requirements​
    9·1 answer
  • How will you identify a file type on your computer?
    5·1 answer
  • My game is telling me to "Press any key." Where is the "any" key?????
    13·1 answer
  • The most widely used computer device​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!