1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRissso [65]
3 years ago
9

What happens to a data table when the formulas or variables used to create it are changed?

Computers and Technology
2 answers:
Mekhanik [1.2K]3 years ago
4 0

Answer:

B.

Explanation:

azamat3 years ago
4 0

Answer:

B. It will automatically update immediately because the formulas are linked.

Explanation:

My report card has so many Bees i thought it was gonna sting me.

Also I got that one correct.

You might be interested in
Why are wiki's not secure​
Nookie1986 [14]
Wikipedia is not a reliable source for citations elsewhere on Wikipedia. Because, as a user-generated source, it can be edited by anyone at any time, any information it contains at a particular time could be vandalism
7 0
2 years ago
A _____ is sent to companies that are hiring to get an interview. résumé brochure business report newsletter plz hurry need it n
frozen [14]

Answer:

A application

Explanation:

3 0
3 years ago
Read 2 more answers
What is the first step in devising security services and mechanisms?
N76 [4]

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

4 0
3 years ago
Read 2 more answers
4. Assuming that social networking at the resorts will require wireless communication and connection to the Internet, what are s
Studentka2010 [4]

Answer:

Social networking capabilities could be made available by the presence of SBRUs central servers and local resort's server. For resorts that are using SBRU servers, there will be high bandwidth access to the internet. This can create a service level of 100% availability. However, for the resorts with high usage clients, a local server could be provided. Similar support will be needed and it will encourage local communication. The possible issues will be problems of connectivity, reliability as well as bandwidth.

Explanation:

Social networking capabilities could be made available by the presence of SBRUs central servers and local resort's server. For resorts that are using SBRU servers, there will be high bandwidth access to the internet. This can create a service level of 100% availability. However, for the resorts with high usage clients, a local server could be provided. Similar support will be needed and it will encourage local communication. The possible issues will be problems of connectivity, reliability as well as bandwidth.

8 0
3 years ago
Which of the following statements about meta tags is TRUE?
Iteru [2.4K]

Answer:

I guess c no. is the answer

6 0
3 years ago
Read 2 more answers
Other questions:
  • The keyboard, mouse, trackpad, microphone, light pen, and voice recognition are examples of _____ devices.
    5·1 answer
  • How were the pages made to create the Book of Kells? a. Scribes prepared the papers using a printing press. b. 185 calves were s
    9·1 answer
  • What aspect does not provide context in a portrait?
    10·2 answers
  • Why when i click home on iphone i still at my grandma house
    11·2 answers
  • sqrt is being defined as a variable name, how do I get its math function to... well... function? (Python)
    11·1 answer
  • What is the use of jacquard loom
    13·2 answers
  • A powerboat is about to cross paths with a sailboat under sail. What should the powerboat do
    5·1 answer
  • 10. Differentiate between equity share & preference share.​
    11·1 answer
  • How to play Drinkopoly game?
    12·1 answer
  • Which page layout is most commonly used for a website with a large navigation menu?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!