1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
3 years ago
7

What is the Microsoft excel window where you work on. And it composed of three worksheet?​

Computers and Technology
1 answer:
antoniya [11.8K]3 years ago
4 0

Answer:

work book

Explanation:

A work book is a book in MS excel which contains work sheet

You might be interested in
What type of network access control uses Active Directory to scan a device to verify that it is in compliance?
Komok [63]

Answer:

Agentless NAC

Explanation:

An active directory is a kind of storage service that holds data of objects like user credentials, resource location etc, for permission and network access authentication.

Network access control is a form of computer network security that integrates security technology like antivirus, intrusion detection and prevention systems etc to system authorisation and authentication processes to control access to a network.

An agentless network access control uses the active directory to scan devices to confirm its compliance to security policies.

3 0
4 years ago
A hard disk is divided into tracks which are further subdivided into:​
marusya05 [52]

Answer:

sectors

Explanation:

hard disk contain tracks which are further divided into sectors, for storage purposes.

8 0
3 years ago
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
MakcuM [25]

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment

Two factors may interfere with the copper cabling and result in signal distortion and data corruption are :

EMI

RFI

Explanation:

  • EMI (electromagnetic interference) is the disruption of operation of an electronic device when it is in the vicinity of an electromagnetic field (EM field) in the radio frequency (RF) spectrum that is caused by another electronic device.
  • During EMC testing, radiated emissions measurements are made using a spectrum analyzer and or an EMI receiver and a suitable measuring antenna.
  • EMI (Electromagnetic Interference) is also called RFI (Radio Frequency Interference).
  • Conducted RFI is unwanted high frequencies that ride on the AC wave form. Radiated RFI is emitted through the air. There are many pieces of equipment that can generate RFI, variable frequency drives included.
  • The internal circuits of personal computers generate EM fields in the RF range.
3 0
3 years ago
What did the strict study generally find about the effect of internet use on sleep?
rjkz [21]
A. should be the answer hope this helps :)
4 0
3 years ago
Read 2 more answers
Match the components of a blog to their descriptions.
motikmotik

Answer:

Explanation:

1. entry title - name of the posting

2. permalink - place where a blog posting is located

3. entry date - when the posting became available

4. comment - allows users to add to the conversation

3 0
3 years ago
Other questions:
  • Need help with this please and thanks
    7·1 answer
  • Question 2 (1 point)
    9·1 answer
  • Which of the following is not a type of user account? A. Administrator b. Guest c. Group d. Standard
    10·1 answer
  • What kind of physical device is an evil twin access point? What does the evil twin do after initial association when the victim
    12·1 answer
  • 1. What are copyright laws? (6 points)
    15·1 answer
  • You wouldn't think a simple shop like Dippy Donuts would be an interesting target for hackers. But look beyond the donuts and yo
    7·1 answer
  • What is the purpose of a forecast worksheet?
    15·1 answer
  • Function _one(array)
    6·1 answer
  • Write a program to input a number.Find the sum of digits and number of digits
    10·2 answers
  • What company was affected by the cloudbleed vulnerability?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!