1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pochemuha
3 years ago
8

In excel, a number can contain the characters__

Computers and Technology
1 answer:
KATRIN_1 [288]3 years ago
7 0
Comma and period? You can have numbers like 123,456.78
You might be interested in
_____ means collecting vast amounts of data from a host of websites.
xenn [34]

Answer:

D

Explanation:

D. Web Scraping is the answer

8 0
2 years ago
Read 2 more answers
How often should administrators and network users be required to change their password?
Sergeu [11.5K]
Once every 3 month's
8 0
4 years ago
The problem identification document commits the final and complete problem specification to paper and guides the software develo
tatuchka [14]

Answer:

False.

Explanation:

The problem identification document contains the description  of the problems that are restricting the goals and objectives of the project from being achieved.

It does not guide in decision making of the software developers.It helps them to see where the problem is not in decision making.

Hence the answer to this question is False.

7 0
3 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
RideAnS [48]

Answer:

True.

Explanation:

A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.

Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.

6 0
3 years ago
Is there anybody who knows eris quirk but me- i feel lonely rn ;-;
Nutka1998 [239]

Answer:i do Eri's Quirk allows her to rewind an individual's body to a previous state. She has shown the ability to rewind someone's body to a point before they existed, which she accidentally did to her father.

3 0
4 years ago
Read 2 more answers
Other questions:
  • Which method of deleting files can be used in windows xp and vista?
    12·1 answer
  • I want to customize my company's logo, name, address, and similar details in all my business documents what option should use?
    12·1 answer
  • Which of these computers was marketed as a computer/game machine?
    15·2 answers
  • An indention where the first line of text is indented and the second and succeeding lines start at the left margin is called ___
    8·1 answer
  • Each professional association has
    7·1 answer
  • Write a program that inputs a time from the console. The time should be in the format "HH:MM AM" or "HH:MM PM". Hours may be one
    6·1 answer
  • Where do players resurrect if they have been destroyed in a game?
    13·1 answer
  • Write a java program to find the perimeter of a triangle with sides measuring 10cm, 14cm and 15 cm.
    8·1 answer
  • Only for study<br><br>Or open Meet and enter this code: bqa-ivfs-ach​
    11·2 answers
  • Consider the following static method.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!