1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nalin [4]
3 years ago
5

What is the cell reference for row 22 and column B? __________ In excel

Computers and Technology
1 answer:
vovikov84 [41]3 years ago
8 0
The cell reference is B22

plz thank me, it keeps me motivated to answer more of your questions :)
You might be interested in
A video game controller contains the buttons: A, B, X, Y. When the player presses A their character Jumps. When the player press
Lina20 [59]

Answer:

Explanation:

The following switch statement takes in the variable button as a parameter and outputs a statement saying what the character did due to the button being pushed.

switch (Character.toLowerCase(button.charAt(0))) {

           case 'a': System.out.println("Your character has Jumped"); break;

           case 'b': System.out.println("Your character has Crouched"); break;

           case 'x': System.out.println("Your character has Punched"); break;

           case 'y': System.out.println("Your character has Flown"); break;

           default: System.out.println("Pause Menu has appeared"); break;

       }

3 0
3 years ago
The merge sort algorithm____________.A. Can be used only on vectors of even length.B. Works by reducing vectors down to the base
V125BC [204]

Answer:

C. Works by merging two sorted vectors into one larger sorted vector

Explanation:

Merge sort is an efficient, general-purpose, comparison-based sorting algorithm.

Merge sort repeatedly breaks down a list into several sub-lists until each sublist consists of a single element and <em>merging</em> those sub-lists in a manner that results into a sorted list.

8 0
3 years ago
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
Write a program that produces a Caesar cipher of a given message string. A Caesar cipher is formed by rotating each letter of a
PilotLPTM [1.2K]

Answer:

Here is the JAVA program that produces Caeser cipher o given message string:

import java.util.Scanner;  //to accept input from user

public class Main {  

   public static void main(String args[]) {  //start of main function

       Scanner input = new Scanner(System.in);  //creates object of Scanner

       System.out.println("Enter the message : ");  //prompts user to enter a plaintext (message)

       String message = input.nextLine();  //reads the input message

       System.out.println("Enter the amount by which by which to rotate each letter : ");  //prompts user to enter value of shift to rotate each character according to shift

       int rotate = input.nextInt();  // reads the amount to rotate from user

       String encoded_m = "";  // to store the cipher text

       char letter;  // to store the character

       for(int i=0; i < message.length();i++)  {  // iterates through the message string until the length of the message string is reached

           letter = message.charAt(i);  // method charAt() returns the character at index i in a message and stores it to letter variable

           if(letter >= 'a' && letter <= 'z')  {  //if letter is between small a and z

            letter = (char) (letter + rotate);  //shift/rotate the letter

            if(letter > 'z') {  //if letter is greater than lower case z

               letter = (char) (letter+'a'-'z'-1); }  // re-rotate to starting position  

            encoded_m = encoded_m + letter;}  //compute the cipher text by adding the letter to the the encoded message

           else if(letter >= 'A' && letter <= 'Z') {  //if letter is between capital A and Z

            letter = (char) (letter + rotate);  //shift letter

            if(letter > 'Z') {  //if letter is greater than upper case Z

                letter = (char) (letter+'A'-'Z'-1);}  // re-rotate to starting position  

            encoded_m = encoded_m + letter;}  //computes encoded message

           else {  

         encoded_m = encoded_m + letter;  } }  //computes encoded message

System.out.println("Encoded message : " + encoded_m.toUpperCase());  }} //displays the cipher text (encoded message) in upper case letters

Explanation:

The program prompts the user to enter a message. This is a plaintext. Next the program prompts the user to enter an amount by which to rotate each letter. This is basically the value of shift. Next the program has a for loop that iterates through each character of the message string. At each iteration it uses charAt() which returns the character of message string at i-th index. This character is checked by if condition which checks if the character/letter is an upper or lowercase letter. Next the statement letter = (char) (letter + rotate);   is used to shift the letter up to the value of rotate and store it in letter variable. This letter is then added to the variable encoded_m. At each iteration the same procedure is repeated. After the loop breaks, the statement     System.out.println("Encoded message : " + encoded_m.toUpperCase()); displays the entire cipher text stored in encoded_m in uppercase letters on the output screen.

The logic of the program is explained here with an example in the attached document.

8 0
4 years ago
[ANSWER = BRAINLIEST] How to mark an answer as brainliest?
Hoochie [10]

Answer:

once your question is answered you get an option available on the bottom of the answer

<em>see attached</em>

and you click on<u> Mark as brainliest </u>

8 0
3 years ago
Read 2 more answers
Other questions:
  • In this code, identify the repeated pattern and replace it with a function called month_days, that receives the name of the mont
    14·1 answer
  • The specifications for ____ are developed by the world wide web consortium (w3c) and are continually evolving.
    13·1 answer
  • How old is the oldest asian
    14·2 answers
  • In general, font size for software-generated presentation slides should be no smaller than __________ points.
    8·1 answer
  • Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data mus
    8·1 answer
  • Write the definition of a function named averager that receives a double parameter and returns-- as a double -- the average valu
    11·1 answer
  • What is wrong with this code and correct it.
    12·1 answer
  • Which one is the answer for the question.
    11·1 answer
  • how do I delete my brainly account, my child signed up for it and nothing has been paid but I do not want the account to exist a
    7·2 answers
  • Juhfvehrfwhedfhwkefhkujhiuyuiyuiyiyh
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!