1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
swat32
3 years ago
10

Why would businesses apply cell protection to spreadsheet entries? Provide one specific example.

Computers and Technology
1 answer:
docker41 [41]3 years ago
6 0

Answer:

To protect a formula

Explanation:

One common example to apply cell protection to spreadsheet entries is to protect a formula used in the sheet to calculate payouts or rankings for example.   A manager might want to share the results of the team to all its team and provides some ranking or other form of calculations in the sheet.  He then needs to protect the formula so it's not altered by the team members or anyone else reviewing the file.

You might be interested in
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and
makvit [3.9K]

Answer:

subnet mask

Explanation:

A subnetwork or subnet mask is a logical subdivision of an IP network.

To find out your subnet mask, the simlest way around it is to is to run a simple command line in windows.

Simply press the Windows key and “R” at the same time to open the command prompt and type “cmd” followed by “enter.” This will allow you to see your subnet mask.

In IPv4, the subnet mask 255.255. 255.0 is 32 bits and consists of four 8-bit octets. The address: 10.10. 10.0 subnet mask 255.255.255.0 this simply indicated that the subnet mask consists of a range of IP addresses from 10.10.10.0 - 10.10.10.255.

Subnet masks (IPv4) are often involved in identifying the range of IP addresses that make up a subnet, it can also be described as a group of IP addresses on the same network.

7 0
3 years ago
How to make a message appear in more than one slack channel
VMariaS [17]

Answer:

On your desktop, hover over the message you'd like to share and click the Share message icon on the right. Use the drop-down menu to choose where you'd like to share the message, and add a note if you'd like. Click Share to see the message expand.

Explanation:

7 0
3 years ago
Who sang devil went down to georgia
katrin2010 [14]

Answer:

Charlie Daniels sang that one for sure

4 0
3 years ago
A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
pychu [463]

Answer:

symmetric encryption

Explanation:

Asymmetric encryption uses 2 keys.

6 0
2 years ago
A _____ virus uses the language of an application that records a sequence of keystrokes and instructions in an application, such
docker41 [41]

Answer: macro virus

Explanation:

The virus that uses virus uses the language of an application which is vital in recording the sequence of the keystrokes and the instructions in an application, like spreadsheet or the word processing in order to hide virus code is the macro virus.

A macro virus is simply a computer virus which is written in same macro language that is being used for software programs. When a software application is being infected by the macro virus, it leads to a sequence of actions which automatically start when the application is being opened.

6 0
2 years ago
Other questions:
  • Olivia creates a personal budget. She enters her current savings account balance in cell D3. In cell A3, she calculates her inco
    8·1 answer
  • If 15 bits are sent in 3 seconds then Bits intervalis__________
    13·1 answer
  • Write a program in java that reads each line in a file, reverses its characters, and writes the resulting line to another file
    15·1 answer
  • What are the advantages and disadvantages of fortran?
    13·1 answer
  • why is there a need of properly interpreting teacher's/manufacturer's specifications before operating any food processing equipm
    9·1 answer
  • On the Format tab, in the Shape Styles group, there is the option to change the _____. a. Shape Effects b. Shape Fill c. Shape O
    5·1 answer
  • Example of negative body language include all but
    8·1 answer
  • An article explaining the uses of the parts of a computer​
    14·1 answer
  • What is the purpose of a hyperlink in a presentation?
    11·1 answer
  • Because his father _____ his ten-speed bike away to punish him for his failing grades, the boy sulked for two days.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!