1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
swat32
4 years ago
10

Why would businesses apply cell protection to spreadsheet entries? Provide one specific example.

Computers and Technology
1 answer:
docker41 [41]4 years ago
6 0

Answer:

To protect a formula

Explanation:

One common example to apply cell protection to spreadsheet entries is to protect a formula used in the sheet to calculate payouts or rankings for example.   A manager might want to share the results of the team to all its team and provides some ranking or other form of calculations in the sheet.  He then needs to protect the formula so it's not altered by the team members or anyone else reviewing the file.

You might be interested in
Write a program whose input is two integers and whose output is the two integers swapped. Place the values in an array, where x
Aliun [14]

Answer:

import java.util.Arrays;

public class swap{

   public static void main(String []args){

       int [] arr = {2,4};

       swapValues(arr);

   }

   public static void swapValues(int[] values){

       int temp;

       System.out.println(Arrays.toString(values));

       temp=values[0];

       values[0]=values[1];

       values[1] =temp;

       System.out.println(Arrays.toString(values));

   }

}

Explanation:

In the program above, we created the method swapValues that receives an array of integers as parameters. in the method definition, we created a temp variable that is used to swapp the element at index 0 and index 1. Java's Arrays.to string method is used to print the array before and after the swap.

7 0
3 years ago
PROGRAM LANGUAGE C
meriva

Answer:

I'm better at C++, but I'm pretty sure this it:

/*C - Program to compare two strings  

character by character.*/

#include<stdio.h>

int main(){

char str1[]="Hello";

char str2[]="Hello";

int len1=0, len2=0;

int i,isSame=0;

 

//calculate lengths

i=0;

while(str1[i++]!='\0') len1++;

i=0;

while(str2[i++]!='\0') len2++;  

 

if(len1!=len2){

 printf("Strings are not same, lengths are different\n");

 return -1;

}

 

isSame=1;  

for(i=0;i<len1;i++){

 if(str1[i]!=str2[i]){

  isSame=0;

  break;

 }

}

 

if(isSame)

 printf("Strings are same.\n");

else

 printf("Strings are not same.\n");

 

return 0;

}

5 0
3 years ago
E-mail is an temporary message medium.<br> a. True<br> b. False
Volgvan

E-mail stands for Electronic mail. It is a method of exchanging messages ("mail") between people in a telecommunication network with the usage of electronic devices. There is a sender and a receiver for any given message, and they switch positions in turn.

The statement that E-mail is an temporary message medium is false. E-mail can be kept forever and are not temporary.


6 0
3 years ago
Read 2 more answers
Select the tasks that would be performed by an information systems graduate.
Tomtit [17]

I think data mining and software design.

6 0
3 years ago
ནས་ད་ དང ་ ་ ་ ་ ་ Az - . Al &amp; Co (NO) - Cat Al (NO) 0 --- - 2N: H2 +0 h20​
Tamiku [17]

Can you be more clear???

7 0
3 years ago
Other questions:
  • 1. What should you do if your computer is shared by your entire family and you install a plugin that saves user names and passwo
    5·2 answers
  • Megan has written the following rough draft for her assignment. Choose the correct way to complete each sentence. Sarah is creat
    13·1 answer
  • Some drugs, like Tylenol, are available over the counter because they are safe in any dose.
    8·1 answer
  • Give one example of a civil engineering structure.
    5·1 answer
  • Positive use of the technology before the pandemic.
    8·1 answer
  • Explain the working principal of computer system with suitable diagarm​
    9·1 answer
  • A 5G network will have the following advantages over a 4G network: a. Overall network support and operations costs are reduced,
    12·1 answer
  • How does a file reader know where one line starts and another ends?
    13·1 answer
  • Online advertising includes: a. All of these are correct. b. ads in print newspapers. c. social media. d. listings on directory
    7·1 answer
  • Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the publi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!