1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRissso [65]
3 years ago
9

What happens to a data table when the formulas or variables used to create it are changed?

Computers and Technology
2 answers:
Mekhanik [1.2K]3 years ago
4 0

Answer:

B.

Explanation:

azamat3 years ago
4 0

Answer:

B. It will automatically update immediately because the formulas are linked.

Explanation:

My report card has so many Bees i thought it was gonna sting me.

Also I got that one correct.

You might be interested in
Which unknown factor affects prices in the financial markets?
telo118 [61]

Answer:

There are four major factors that cause both long-term trends and short-term fluctuations. These factors are government, international transactions, speculation and expectation and supply and demand.

Explanation:

5 0
3 years ago
How is an orthographic drawing similar or different from an isometric drawing
Savatey [412]
An Isometric drawing<span> is a quasi 3d </span>drawing<span> that shows the height width and depth of the object in a single view where the viewpoint is at a 45 degree angle from each of the perpendicular planes of the </span>orthographic<span> view. </span>Isometric<span> differs from a perspective view in that all lengths are shown true length.</span>
6 0
3 years ago
What is the total utilization of a circuit-switched network, accommodating five users with equal bandwidth share, and the follow
VMariaS [17]

Answer: 49.0%

Explanation:

Given the total number of users = 5

Let the total bandwidth be 100 units

Each user share = 100/5 units = 20 units each

• 2 users are using 63% of their shared bandwidth:

This means 63% of 20 units = 0.63 *2*20 = 25.2

• 2 users are using 58% of their shared bandwidth:

This means 58% of 20 units = 0.58* 2* 20 = 23.2

• 1 user uses 3% of their bandwidth share:

This means 3% of 20 units = 0.03* 1* 20 = 0.6

Therefore, total amount of used bandwidth becomes = 25.2 + 23.2 + 0.6

Total bandwidth under usage = 25.2 + 23.2 + 0.6 = 49

Utilization becomes = (bandwidth under usage/ maximum bandwidth)*100

(49/100)*100 = 49%

I hope this helps, cheers.

4 0
3 years ago
What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network res
Citrus2011 [14]

Answer:

"Direct access" is the correct answer for the above question .

Explanation:

  • Direct access is a feature available in the window server of the 2016 version. It is used to allow access to the computer system program and the internet remotely behaves like that computer or network is his computer or network.
  • It allows remote users to do anything with the help of an internet connection. But it can be done with the authorization of valid users.
  • The above question states about the features which grant to access the internet for the remote users and this is available in window server 2016. This feature is known as "Direct access".
7 0
3 years ago
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
3 years ago
Other questions:
  • If a local DNS server cannot find an IP address for a specified URL, it does this.
    9·1 answer
  • Write a program that prompts the user to enter an equation in the form of 10 5, or 10-5, or 1*5, or 13/4, or 13%4. The program s
    6·1 answer
  • What’s of the following can be used to visually represent information similar to diagrams format painter Helens smart are a clip
    8·1 answer
  • Which device in a wireless local area network (wlan) determines the next network point to which a packet should be forwarded tow
    12·1 answer
  • In which of these scenarios would the top 10 option be most helpful
    10·1 answer
  • Julian is adding a column of numbers as he inputs expenses from his receipts. Holly wants to create a simple comparison between
    13·1 answer
  • What does it mean to say RAM is volatile? *
    9·1 answer
  • Need help with Brainly!! Thanks in advance for sharing your thoughts or answering any of my questions on this. [][] Firstly, Bra
    14·1 answer
  • 5. Which one of these can connect directly to the internet?
    9·2 answers
  • In this assignment, you will implement an online banking system. Users can sign-up with the system, log in to the system, change
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!