1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
4 years ago
10

Ayuda no encuentro la información de estas tres preguntas:

Computers and Technology
1 answer:
Morgarella [4.7K]4 years ago
3 0

Answer:

Sorry i don't know.........!!!!!!!!!!

Explanation:

You might be interested in
you want to be able to restrict values allowed in a cell and need to create a drop-down list of values from which users can choo
STALIN [3.7K]

The  feature to restrict values allowed in a cell and need to create a drop-down list of values from which users can choose in the above scenario is data validation.

<h3>What is data validation?</h3>

Data validation is a term that connote the act of monitoring the truthfulness and quality of source data before one can make use of it, importing or even  process data with it.

Note that The  feature to restrict values allowed in a cell and need to create a drop-down list of values from which users can choose in the above scenario is data validation as it ensure that users can make their own choice.

Learn more about data validation from

brainly.com/question/27138101

#SPJ1

8 0
3 years ago
In the late 1990s, Microsoft was sued for "tying" its Internet browser, Internet Explorer, to its operating system. A seller for
LekaFEV [45]

Answer:

Section 3 of the Clayton act.

Explanation:

Section 3 of the Clayton act 15 U.S.C.S § 14, makes illegal some kind of distribution practice that facilitates monopolistic arrangement that is section 3 of the Clayton act makes it illegal to enter into tying arrangement, exclusive dealing contracts or requirement contracts if such contracts tends to lessen competition. Where customer is required to pay for an undesired product in order to obtain a desired product.

3 0
3 years ago
PLS HURRY<br> Look at the image below
Nimfa-mama [501]

Answer:

20

Explanation:

During the first iteration for the list [1, 4], numB = 1.

During the first iteration of the list [2, 3], numA = 2.

answer = answer + numA + numB

= 0 + 2 + 1

= 3

Since the list [2, 3] is in a nested loop, we need to first finish iterating the whole list before numB iterates to the next number, so numA = 3 this time and numB still stays at 1.

answer = answer + numA + numB

= 3 + 3 + 1

= 7

Now, numB moves to 4 and numA starts back at 2 again.

answer = answer + numA + numB

= 7 + 2 + 4

= 13

numB still says at 4 and numA moves to 3 since it is in a nested loop:

answer = answer + numA + numB

= 13 + 3 + 4

= 20

print(answer) will print the output 20.

Hope this helps :)

4 0
3 years ago
In December of 2009, hackers broke into computer systems and stole secret defense plans of the United States and South Korea. Th
svetlana [45]

Answer:

Cyberterrorism

Explanation:

Cyberterrorism is unlawful use and exploitation of computers and networks (internet) by an individual or a group.

This is done to carry out illegal activities that can cause serious harm to people, government or causing large scale damage to computer systems.

The motivation behind cyberterrorism is usually to achieve some political or ideological or personal objectives, to cause disruption and coercion in a community, to damage the security systems or other government programs thus causing "terror".

Cyberterrorism is done using internet to cause damage to other computer systems  by means of malicious software in order to create disruption, terror or stealing the sensitive information.

For example the cyber terrorists can steal confidential information of military department by attacking the security systems for some political gain just as the hackers stole secret defense plans of US and South Korea which was an act of cyberterrorism.

7 0
4 years ago
Unauthorized use of computer system with a view to seeing or changing data is refered to as
Semmy [17]

Answer:

I believe hacking I don't know for sure you may want to see what someone else says

Explanation:

3 0
3 years ago
Other questions:
  • Which option of ms-word is used o represent data in an organised manner?
    10·1 answer
  • In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red
    13·1 answer
  • Analytical processing uses multi-levelaggregates, instead of record level access.? True? False
    12·1 answer
  • Quien invento el primer vehiculo con motor?
    15·2 answers
  • Plz help me of this answer<br><br><br>language:python​
    7·2 answers
  • Please help! i need to answer this soon!
    13·1 answer
  • Imagine you had a learning problem with an instance space of points on the plane and a target function that you knew took the fo
    11·1 answer
  • Emotions can have Impact on your driving?
    10·1 answer
  • Hi<br>is it right?<br>"I think there is a small mistake in the quotation(second not first)"​
    5·1 answer
  • During which phase of the writing process is it best to have other
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!