1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeTakaya
2 years ago
7

Having data in a column formatted differently based on value is known as

Computers and Technology
1 answer:
ziro4ka [17]2 years ago
5 0
I believe it’s called Excel Formula
You might be interested in
If an ______ is caught dumping hazardous materials, that person can be prosecuted. Answer choices A) Employee B) Employer C) Bot
Citrus2011 [14]

Answer:

Both A and B

Explanation:

I think it is right

hope this helps :)

5 0
2 years ago
What is the price of a k1 speed birthday party?
valentinak56 [21]
There is differen prices depending on the race go to the k1 website to see the packages
8 0
3 years ago
Read 2 more answers
Timeliness is an important goal of any access control monitoring system.<br> A. True<br> B. False
Damm [24]
The answer for this question is true
7 0
3 years ago
Describe the components of the Web. Your friend wants to create and publish a Web page. He tells you that he wants to learn the
iren [92.7K]

Answer:

The answer is "HTML".

Explanation:

We will suggest him to learn HTML language because It stands for HyperText Markup Language. It is a markup language that uses a build a web page and these sites are normally viewed on the web browser.

  • It is the language for development used in the World Wide Web.
  • This language includes writing, links, images, videos, and audio files.  
  • Each one of these kinds of content is tagged and described by HTML, which uses a web browser can display it correctly.
3 0
2 years ago
What are the differences and similarities of computer virus and biological virus. Give 4 examples
Papessa [141]

Answer:

During recent months, we’ve witnessed an unexpected and distressing pandemic of a coronavirus disease. What I find especially distressing about it is how the worldwide adversity was caused by just a tiny thing — namely, a virus called SARS-CoV-2.

However, biological viruses have always been a potent threat to humanity, as historic pandemics have proved. No wonder viruses became an ideal weapon model in a totally different world — a world of programming. The first computer viruses were created as early as in the 1970s. Starting as pranks, they evolved to become a major threat to the stability of computer networks worldwide. And the more I think of viruses, both biological and digital, the more amazed I am by their similarities.

We don’t know what kind of challenges viruses of either type will cause in the future, but understanding how they infect, the symptoms they induce, how they spread, and the damage they can cause can help us fight both.

The Common Thread

Let’s start with the basics: What does a virus look like?

computer virus of 1999

Click image for larger version

Figure 1: Pictured on the left is an electron microscope image of SARS-CoV-2 particles - the pandemic-causing coronavirus. Source: NIAID-RML. Pictured on the right is a code snippet of a Melissa, the notorious email-spreading computer virus of 1999. Source: Gizmodo.

The images in Figure 1 might look vastly different, but, essentially, they’re the same: a string of code. In the coronavirus, it’s the RNA genome in a shell; in Melissa, it’s computer code. In both cases, the code is an “instruction” for the virus to follow.

Explanation:

here is your answer hope you will enjoy

thank you

6 0
2 years ago
Other questions:
  • Which is an example of intrinsic motivation?
    13·2 answers
  • The maximum number of colors that should be used on a slide is _____. 2 4 6 8
    12·2 answers
  • Describe the following software process models using your own words .Your explanation should also provide an example of a softwa
    12·1 answer
  • An array name and index are separated using ____.
    13·1 answer
  • Which option marks all modification made within a document? Review Comment Track Changes Balloons
    15·2 answers
  • The PICC team is scheduled to remove a PICC before client discharge. Assessment of the catheter indicates the PICC and determine
    7·1 answer
  • 1. Define a C++ function with the name evaluateBook. The function receives as one argument the name of the file to be processed
    13·1 answer
  • Why are the social and ethical consequences of emerging technology hard to
    10·1 answer
  • I had tried to turn on Linux on the Chromebook but it's not working
    11·2 answers
  • Five uses of the operating system​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!