1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
3 years ago
8

Which option represents the location of the Goal Seek function?

Computers and Technology
2 answers:
Harman [31]3 years ago
7 0

Answer: B. data tab, forecast group is the correct answer 100%

Explanation:

Got it on edg

sweet-ann [11.9K]3 years ago
3 0

Answer:b

Explanation:

You might be interested in
You work as an IT Technician for uCertify Inc. David, a user, has recently purchased a laptop computer. He is now complaining th
olganol [36]

Answer:

Check the hardware switch on the wireless antenna card that activates the service.

Explanation:

The person works for uCertify Inc as an IT Technician. David, a regular, has just buy a laptop. He still says that he will not link to a wireless connection, although his laptop seems to have an inner wireless app. So, by checking the hardware switch on the wireless antenna card that activates the service, that person resolves the issue.

7 0
3 years ago
True or false: if we’re short side the subject in our composed frame, we have given the subject the maximum amount of “lead room
denis-greek [22]
I think it’s false I’m not to sure
3 0
3 years ago
• Use variable to create the number 0 at location 0, 400.
pashok25 [27]

Answer: i thinks its

Explanation:

$('button')

 .html('Click me') // Try edit it...

 .on('click', () => console.log(''))

.on('click', () => console.log(''))

.on('click', () => console.log(''))

console.log('App started')

8 0
2 years ago
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
Which networking model can the network now support that it could not support without the addition of the eighth computer?
ValentinkaMS [17]

I guess the correct answer is cliеnt-sеrvеr mοdеl

Thе cliеnt-sеrvеr mοdеl is a distributеd cοmmunicatiοn framеwοrk οf nеtwοrk prοcеssеs amοng sеrvicе rеquеstοrs, cliеnts and sеrvicе prοvidеrs. Thе cliеnt-sеrvеr cοnnеctiοn is еstablishеd thrοugh a nеtwοrk οr thе Intеrnеt.

Thе cliеnt-sеrvеr mοdеl is a cοrе nеtwοrk cοmputing cοncеpt alsο building functiοnality fοr еmail еxchangе and Wеb/databasе accеss. Wеb tеchnοlοgiеs and prοtοcοls built arοund thе cliеnt-sеrvеr mοdеl arе:

  • Hypеrtеxt Transfеr Prοtοcοl (HTTP)
  • Dοmain Namе Systеm (DNS)
  • Simplе Mail Transfеr Prοtοcοl (SMTP)
  • Tеlnеt

Cliеnts includе Wеb brοwsеrs, chat applicatiοns, and еmail sοftwarе, amοng οthеrs. Sеrvеrs includе Wеb, databasе, applicatiοn, chat and еmail, еtc.

4 0
4 years ago
Other questions:
  • Uugurfofyhjfsjvrdjctstghfjddd
    13·1 answer
  • How many bytes of information can be stored on a hard drive?
    7·1 answer
  • Which would increase electric current? increasing the resistance increasing the size of the wire decreasing the voltage
    6·1 answer
  • 1) Why is angle of view important? What are some of the ways that you can do this?
    6·1 answer
  • Create a method to search an un-ordered array of integers for a value, if the value is found return the index of its position in
    10·1 answer
  • What is the primary difference between the windows server 2012 r2 server manager and previous versions (before windows server 20
    11·1 answer
  • In this lesson you wrote code to make the turtle draw squares. Briefly describe how the code for
    11·1 answer
  • How has the Internet expanded the reach of all of these types of media?
    5·1 answer
  • What is an example of new technology having a negative impact on sustainability?.
    7·1 answer
  • Which two features could be added to a game using an "if () then " block
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!