1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semenov [28]
3 years ago
14

Read the spreadsheet formula below, then answer the question.

Computers and Technology
2 answers:
Phantasy [73]3 years ago
8 0

Answer:

b. Selects all of the cells in the range C6 to C9

Alenkinab [10]3 years ago
3 0
Selects all of the cells in the range C6 to C9
You might be interested in
what component of virtualization controls all physical memory, and thus has the ability to make any unused memory pages in each
svlad2 [7]

Since the hypervisor, a component of virtualization, is in charge of managing all physical memory, it can make any memory pages left over in each guest virtual machine available to other virtual machines or the host computer.

<h3>What Exactly Is A Hypervisor?</h3>

A hypervisor is a class of computer software, firmware, or hardware that builds and manages virtual machines (also known as a virtual machine monitor, VMM, or virtualizer). A host machine is a computer on which a hypervisor is running one or more virtual machines, and a guest machine is a specific virtual machine. The hypervisor controls how the guest operating systems are executed and provides them with a virtual operating environment. The visitor often uses the native hardware to carry out instructions, unlike an emulator. The virtualized hardware resources may be shared by several instances of various operating systems. For instance, Linux, Windows, and macOS instances can all operate on a single real x86 computer. Contrastingly, with operating-system-level virtualization, each instance (often referred to as a container) only needs to share a single kernel, while the guest operating systems—such as various Linux distributions using the same kernel—can differ in user space.

To know more about Softwares, visit:

brainly.com/question/1022352

#SPJ4

6 0
1 year ago
What is the output of the following program?
Kamila [148]

Answer:

0

3

6

Explanation:

7 0
3 years ago
How do operating system work?
SIZIF [17.4K]

Answer:

The "operating system" manages software and hardware on the computer. Uploads files, has great memory and processes management.

7 0
3 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
postnew [5]

Answer: Computers as target

Explanation:

Whenever an authorized  access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.

8 0
3 years ago
Generally speaking, the _______ the risk, the _______ the potential return or loss
givi [52]
<span>The correct answer is higher for both blank spaces.

We all know the famous saying: "No risk, no reward". What is true is the higher your risk you also have a higher degree of reaping a higher rewards. But the opposite is also true, the more you risk the more you stand to lose. In stockbroker business this is best exemplified, as you can se brokers trying to predict the stock market in order to make greater profits. Gambling is also the good example of this. </span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • Ryan is looking at investment opportunities as a cloud service provider. He wants to invest in a deployment-based cloud model th
    11·2 answers
  • Utilities software and word processing software are both eamples of
    10·1 answer
  • You can apply bold, italic, and underline styles to text. But why is it a good idea to use underline sparingly?
    13·2 answers
  • You use different office apps to accomplish specific tasks, such a creating a newsletter or producing a sales presentation, yet
    8·1 answer
  • What is the simplest way to permanently get rid of a unwanted file
    12·1 answer
  • Which statement is used to create a file object that will append data to an existing file? BufferedWriter salesdata =
    7·2 answers
  • he degree of operating leverage is equal to: Group of answer choices FC / OCF. VC / OCF. 1 FC / OCF. 1 VC / OCF. 1 Picture FC /
    9·1 answer
  • What is a computer modem?​
    9·1 answer
  • besides entering a url to go directly to a website, what else can you enter in a browser address bar to explore the internet?
    10·1 answer
  • It's generally best to use what types of sites for factual internet research? Select all that apply from the choices below.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!