1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
3 years ago
8

97 points pleaseeee helpppp

Computers and Technology
2 answers:
Korvikt [17]3 years ago
4 0

Answer: everything that the other person said

Explanation:

Helen [10]3 years ago
3 0
Things you can do on a Excel spreadsheet is Bring data together, Build great charts. Many people also use this to generate memos, track sales and track sales trends.



Sorry this wasn’t a lot, but this is all I could think of.
You might be interested in
Compare and contrast the uses of NetWitness Investigator and Wireshark used in the lab. Why would a network administrator use Wi
Ahat [919]

<u>Explanation:</u>

Note, the Wireshark software application is unique in that it has the ability to perform multiple layers of individual packet analysis.

Whereas in NetWitness Investigator software application, even though it doesn't go deeper like Wireshark, it can still detect new threats or problems in a network and then organized all of such information for the administrator.

So, in a sense, by using both applications, a network administrator can find the problems (using Wireshark), while another application (NetWitness Investigator) organizes them for him.

3 0
3 years ago
What is the unit of information called when a network adapter adds the source and destination mac address to the segment of data
Blababa [14]
MAC addresses are part of the header that's put on the packet.
3 0
3 years ago
Given a effective delay of 99ms when network usage is 74%, what is the effective delay when network usage = 84% ?
NARA [144]

148.5 ms is the effective delay when network usage = 84% .

<h3>what is a computer network?</h3>
  • A group of computers sharing resources that are available on or offered by network nodes is known as a computer network.
  • Over digital links, the computers communicate with one another using standard communication protocols.
  • These connections are made up of telecommunication network technologies, which are based on physically wired, optical, and wireless radio-frequency means and may be set up in a number of different network topologies.
  • Personal computers, servers, networking equipment, and other specialized or general-purpose hosts can all function as nodes in a computer network.
  • They can have hostnames and are identifiable by network addresses.
  • After being assigned, hostnames act as recognizable labels for the nodes and are seldom updated.
  • Network addresses are used by communication protocols like the Internet Protocol to locate and identify the nodes.

To learn more about the topic, refer to the following link

brainly.com/question/8118353

#SPJ4

3 0
2 years ago
WILL GIVE BRAINLIEST
Fiesta28 [93]

Answer:

c

Explanation:

c

6 0
3 years ago
Read 2 more answers
The net force on a vehicle that is accelerating at a rate of 1.2 m/s2 is 1500 newtons. What is the mass of the vehicle to the ne
Rudiy27

Answer:

The mass of the vehicle is 1250kg

Explanation:

Given

Net\ Force = 1500N

Acceleration = 1.2m/s^2

Required

Determine the vehicle's mass

This question will be answered using Newton's second law which implies that:

Net\ Force (F) =  Mass (m) * Acceleration (a)

In other words:

F = ma

Substitute values for F and a

1500 = m * 1.2

Make m the subject

m = \frac{1500}{1.2}

m = 1250kg

<em>Hence, the mass of the vehicle is 1250kg</em>

6 0
3 years ago
Other questions:
  • What is cloud storage?​
    11·1 answer
  • What is the difference between deta security and privecy ?
    12·2 answers
  • Select the correct answer.
    8·1 answer
  • Adding software to a digital device, or adding hardware components to a digital device is called _____ .
    13·1 answer
  • When you search google for​ dishwashers, you are likely to see a number of inconspicuous ads for​ advertisers, including product
    11·1 answer
  • Why is outfitting a workplace with video games in a technology development company consiered a strategic use of money
    14·1 answer
  • What are ways to enter formula in Excel? Check all that apply
    8·2 answers
  • A proposal is also known as a
    14·2 answers
  • What does hashing mean when it comes to cryptography?
    15·2 answers
  • By default, Outlook displays messages in the Content pane grouped by the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!