1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
2 years ago
10

When activated, an Excel object has all the features of an Excel

Computers and Technology
2 answers:
Rainbow [258]2 years ago
7 0
D. Workbook
Hope this helps
Alona [7]2 years ago
7 0

Answer:

Excel workbook ( D )

Explanation:

An excel object when it is activated will have all the features of an excel workbook because an excel workbook is the collection of more than one excel worksheets that will makeup the excel workbook. as with the name it is the book while the sheets are likened to be the pages in the book.

while an excel object is the collection of the entirety of all the functions that make up the excel workbook which includes spread sheets, columns, rows and even the excel workbook itself. an excel object has its properties stored in itself. hence it has all and more of the features of an excel workbook.

You might be interested in
"The _____ of the Open Systems Interconnection (OSI) model generates the receiver’s address and ensures the integrity of message
aleksklad [387]

Answer:

The transport layer

Explanation: Layer 4, is the transport layer of the Open System Interconnection (OSI), that handles message transfer of data between end systems or hosts and ensures complete packets transfer.

7 0
2 years ago
Read 2 more answers
One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs
Makovka662 [10]

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs.

<h3>What is malware?</h3>

Malware is any programme that is purposely designed to disrupt a computer, server, client, or computer network, leak private information, obtain unauthorised access to information or systems, deny users access to information, or otherwise interfere with the user's computer security and privacy.

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs. The reason for this is that such links may contain malware or spyware.

Learn more about Malware:

brainly.com/question/14276107

#SPJ1

7 0
2 years ago
Pls due soon
Natasha_Volkova [10]

Answer:

Software for personal computers is typically developed and distributed independently from the hardware or operating system manufacturers. Many personal computer users no longer need to write their own programs to make any use of a personal computer, although end-user programming is still feasible. This contrasts with mobile systems, where software is often only available through a manufacturer-supported channel. And end-user program development may be discouraged by lack of support by the manufacturer.

Explanation:

5 0
3 years ago
Definition of my computer​
RideAnS [48]

Answer:

a programmable electronic device designed to accept data

Explanation:

a programmable electronic device designed to accept data

8 0
2 years ago
Read 2 more answers
How does a barcode work?
Genrish500 [490]
A barcode's bars have 

1. different thicknesses, so they each signify 1 or 2 nibbles. 
2. the combinations of the thicknesses of those bars exceed the trillions. That's why manufacturers and stores never run out of SKU barcodes.
4 0
3 years ago
Other questions:
  • Ok, so this isn't a tech question it's about a game, moomoo.io so don't hate on this if you don't know it, 40 points to whoever
    12·2 answers
  • Information from the system that is used to make modifications in the input, processing actions, or outputs is referred to as: G
    9·2 answers
  • PLEASE HELP!!!!
    7·1 answer
  • Is the answer a,b,c,d
    8·1 answer
  • Code works, need help writing header file.
    8·1 answer
  • Which steps are correct for creating a document from a user-defined template?
    15·1 answer
  • Why it is not recommended to add sound effect on slide transition? Write at least two reasons.​
    6·1 answer
  • Creating a Numpy Array
    5·1 answer
  • What is a disadvantage of communicating on social media?
    14·1 answer
  • Using computers can lead to a number of physical safety issues. State and explain TWO(2) of these types of issues.​​​​​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!