1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ohaa [14]
3 years ago
11

Which cell formatting is most likely to use $?

Computers and Technology
2 answers:
Katena32 [7]3 years ago
6 0

Answer:

currency

Explanation:

    Currencies have a graphical representation generally consisting of two parts: an abbreviation for the monetary standard, which varies from country to country, and the dollar sign, the universal symbol of money, which originates etymologically from the Arabic cifr.

TiliK225 [7]3 years ago
4 0
Currency is the correct answer
You might be interested in
Andy works for a TV broadcasting company. He needs to set up a network covering a small area on the work floor. However, he noti
katen-ka-za [31]
I believe it’s B)LAN

Explanation:
A LAN connects computers over a relatively short distance, allowing them to share data, files, and resources. For example, a LAN may connect all the computers in an office building, school, or hospital. Typically, LANs are privately owned and managed.
4 0
2 years ago
Coffee shops worldwide throw away billions of paper cups each year. Discuss
garik1379 [7]

Answer:

They should give out a coffee cup to each person and charge full price for the first time that you fill the cup but then after they finish the first drink they should offer a discount if you reuse the same cup. They should tell you that you can bring back coffee cups from even a few days ago and you could still be eligible for the discount. This way even people that don't drink as much coffee can still be eligible to get a discount on their coffee.

Explanation:

:)

4 0
2 years ago
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
In order to be an effective employee who knows recent information on loans and laws, in what topic should your information be cu
Paraphin [41]

Answer:

industry politics

Explanation:

In order to be an effective employee who knows recent information on loans and laws, your information should be current in industry politics.

This ultimately implies that, an employee who wants to be well-informed and knowledgeable on recent informations on loans and laws, is saddled with the responsibility of gathering and sourcing for informations through industry politics. Thus, the employee must have been involved in working with various industry leaders and most likely to have interacted with various employees working there.

Industry politics can be defined as a group of policies, standards and regulations set by the government to promote and facilitate competitiveness among the private and publicly owned industries.

6 0
3 years ago
What is the full form of html​
zepelin [54]

Answer:

Hypertext Markup Language

Explanation:

Hypertext Markup Language

5 0
3 years ago
Read 2 more answers
Other questions:
  • Help asap. 10 points.
    8·2 answers
  • If you want to use your computer for recording your band, you would benefit most from a(n)
    13·2 answers
  • Anna’s computer will not power on. What aspect of the computer should Anna check (hardware or software)? How can Anna work to re
    5·1 answer
  • Exchange is defined as the trade of goods between two nations. This phenomena is also known as ___________.
    9·1 answer
  • Computer keyboard failures can be attributed to electrical defects or mechanical defects. A repair facility currently has 25 fai
    14·1 answer
  • Translate the following C program into an assembly program. The C program finds the minimal value of three signed integers. Assu
    13·1 answer
  • Which of the following speeches is an example of a demonstration speech? a. “Who was Abraham Lincoln” b. “The Human Brain and it
    5·1 answer
  • Hosts on the Internet have ________ addresses. Group of answer choices both A and B neither A nor B IP data link
    13·1 answer
  • Blockchain is often associated with Bitcoin and the financial services industry. However, it is applicable to almost every indus
    13·1 answer
  • Cyber vulnerabilities to dod systems may include
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!