1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
3 years ago
7

In Microsoft Excel, repeated hashes (#####) imply which of the following?

Computers and Technology
1 answer:
shtirl [24]3 years ago
3 0

.......................................................

You might be interested in
Which one bc im struggling
Setler79 [48]

Answer:

cant really see it

Explanation:

3 0
3 years ago
   In the Start menu of Windows 7, you see your name listed as an option. Where does this shortcut lead if you select it?
ss7ja [257]
I do believe the answer is c. I used to own a computer with a windows 7 program.

5 0
4 years ago
A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.
IRINA_888 [86]

Answer:

The correct answer to the following question will be "Access".

Explanation:

  • Registered users have legal access to a network, while hackers may access a system illegally. The capacity is controlled by access controls. Access is defined as the right of a subject or object to use, manipulate, modify, or influence another subject or object.
  • Access control was the selective limitation of access to a location or other property while the mechanism is represented by access management. Access act may mean use, entry, or use. Permission is called authorization to access a resource.

Therefore, Access is the right answer.

5 0
3 years ago
Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.
vredina [299]

Answer:

The answer is "Option c"

Explanation:

In the given question only option c is correct because "/27" is the IP "255.255.255.224" is the same as "/27" in the terminology in CIDR, in which it uses the compact IP address as well as corresponding prefix expression and it terminology consists of an IP with a slash ('/') or a decimal number. Its count of 1-bit proceeding to the mask traditionally referred to it as the network mask.

5 0
3 years ago
What are some of the challenges that could arise from setting up a file management system on a computer?
adell [148]
What are some of the challenges that could arise from setting up a file management system on a computer
3 0
3 years ago
Other questions:
  • The publisher tab in the application control allows you to manage the various certificates that are used to do what to binaries?
    8·1 answer
  • Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his ma
    7·1 answer
  • Please find one organization that has recently adopted virtualization and summarize their reasons for taking this approach. What
    12·1 answer
  • In rolling a die four times, what is the odds that at least one 5 would appear?
    6·1 answer
  • Which of the following is non-volatile storage?
    6·1 answer
  • What name is given to the method used to copy a file onto a CD
    11·1 answer
  • Another way to create a new presentation is from the Home tab
    6·2 answers
  • Which of these statements performs real number quotient division using type casting?
    10·1 answer
  • ________ can contain stacked images, text, and other elements which collectively comprise a Photoshop file.
    7·1 answer
  • At a commercial quick charge station, a fully depleted 87 kwh battery in 2023 ariya can be charged from 20% to 80% in about ____
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!