1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pochemuha
3 years ago
8

In excel, a number can contain the characters__

Computers and Technology
1 answer:
KATRIN_1 [288]3 years ago
7 0
Comma and period? You can have numbers like 123,456.78
You might be interested in
A vast global network that is made up of many smaller interconnected networks is known as:
Galina-37 [17]

The answer is The Internet.   It is a vast global network that is made up of many smaller interconnected networks. It connects to millions of computer units world wide, in which any computer can communicate with any other computer as long as they are both connected to the Internet. It also made access to information and communication easier.

6 0
4 years ago
Read 2 more answers
1. From where you can access save command?
Alja [10]

Answer:

1 no. ans

none of above

this ans is not 100% correct but also it help may help you

4 0
3 years ago
​passwords used as encryption ________ help to make hijacked data unusable.
DerKrebs [107]
Passwords are used<span> for authentication and </span>encryption. Password entropy is a measurement of how unpredictable a password is.
Passwords used as encryption keys help to make hijacked data unusable. The encryption key is a <span>random string of bits created explicitly for scrambling and unscrambling data.</span>
5 0
3 years ago
In a social networking site your personal information is listed under your inbox. home. status. profile.
Sladkaya [172]
Profile let's go with profile hope this helps
3 0
3 years ago
The concept of _________________ comes from the acknowledgment that data changes form and often gets copied, moved, and stored i
saveliy_v [14]

Answer: data loss protection

Explanation:

In any organization or enterprise it is very essential to provide protection from data loss to avoid breaches by unauthorized accesses and to secure the data irrespective of whether it is in rest or motion.

It is known that data changes its form when it is copied, moved and stored in different memory location so in this process a lot of sensitive data might be exposed to the outside world and left into the hands of the unauthorized for easy of access to it.

So once a security breach is possible through the system or into the network of the organization it would expose all the application database, emails, spreadsheets and the personal workstation files. So in such a scenario the importance of data loss protection is highlighted and must be given due importance.

8 0
4 years ago
Other questions:
  • The ____ loop stops when the loop has processed every element in an array.?
    7·1 answer
  • To what device, inside the computer, do all other devices connect
    10·2 answers
  • The linux command _______ can be used to list the current disk devices connected to the computer.
    8·1 answer
  • *Could someone please help me with this***
    5·1 answer
  • Different units of CPU ?
    12·1 answer
  • He flow of electric charges through a material describes an electric _______.
    10·1 answer
  • Which is a connectionless protocol in the transport layer? What are the small chunks of data called?
    12·2 answers
  • Does anyone know how to change there Name of the account that shows up? If you do please tell me in a comment and/or Answer.
    6·2 answers
  • What does the sign (#) mean in manuscript edpm<br> and also what does (DEL)
    15·1 answer
  • Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to ta
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!