1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
3 years ago
8

Which option represents the location of the Goal Seek function?

Computers and Technology
2 answers:
Harman [31]3 years ago
7 0

Answer: B. data tab, forecast group is the correct answer 100%

Explanation:

Got it on edg

sweet-ann [11.9K]3 years ago
3 0

Answer:b

Explanation:

You might be interested in
You have found statistics on the Internet that you would like to use in your speech.
miss Akunina [59]

Answer:

You cite them correctly and that the statistics are real.

Explanation:

5 0
3 years ago
You just received a message from the internet which was encrypted with asymmetric encryption. what do you need to do to read the
Bezzdna [24]
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.

a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.

c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption

d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.

So e is the only logical answer.
5 0
3 years ago
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
Consumers who wish to make a purchase from other consumer on ebay need tl
il63 [147K]

Answer:

Bid on item

Explanation:

Consumers who wish to make a purchase from other consumer on ebay need to first of all bid on the item. This is done by specifying the price in which the purchase should be made.

When this is done, the seller contacts the buyer if he/she’s okay with the price of the goods and services and other formalities are discussed.

8 0
3 years ago
A(n)<br> is a fast compute with lots of storage. pls help
Pachacha [2.7K]

Answer:

Surface Laptop 3 - 15", Platinum (metal), AMD Ryzen 5 3580U, 8GB, 128GB

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which aspects of a project do project makers oversee?
    12·2 answers
  • Given the strings s1 and s2 that are of the same length, create a new string consisting of the last character of s1 followed by
    10·1 answer
  • What is the purpose of the .NET Framework Class Library? a. it provides pre-written code that can be used by .NET applications b
    13·1 answer
  • Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free pro
    14·1 answer
  • DECIPHER AND SOLVE THIS<br><br> SCC:R<br> D<br> YJOTE VP=GPIMFRT
    15·1 answer
  • Write a procedure ConvertToBinary that takes an input as a number from 0 to 16 (including 0 but not 16) and converts it to a bin
    11·1 answer
  • Which user interface part shows graphical output of mined data?
    8·2 answers
  • How do you remove a key cap without a kaycap remover (keyboard keycap) ​
    11·1 answer
  • Where to get industrial circuits far cry 6
    8·1 answer
  • You defined a shoe data type and created an instance.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!