1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaK [193]
3 years ago
6

What is the cell name for the 237th row and 10th column​

Computers and Technology
2 answers:
bazaltina [42]3 years ago
4 0

Answer:

an 237+10 row 247 row column

anygoal [31]3 years ago
3 0

Answer:

is there a picture you can attach to show the cell, row, and column?

Explanation:

You might be interested in
Oliver is creating anime using a less popular, traditional tool to create the style anime is known for. Which tool is Oliver usi
Makovka662 [10]
I think it might be c or b
5 0
3 years ago
Read 2 more answers
What can help you best learn about appearance, habitats and behaviors of birds in your area
Korvikt [17]

c microbiology textbook

8 0
3 years ago
A typeface in which each character has the same width and is often used to display programming code is _
True [87]
The answer is monospace
6 0
4 years ago
You are asked to assume the role of an employee of the DigiFirm Investigation Company. As part of its community outreach effort,
kirill [66]

Answer:

1.  To trace an email we need to examine the header part of the email. By examine the header of an email we could extract the sender, subject and other important credentials related to that email.  

2. The command to trace the email id is “whois” command.

 First open the email client and find the IP address of the received email that need to be traced.  The command “whois” IP address gives the registration information of that IP address.

 3.  Reverse address/email search is the procedure used by the experts to find the origin or the ownership of the email.  Rather than tools websites are more use full in the reverse address search.

http://reverse.addresssearch.com, www.iplocation.net, etc. are good to find the ownership of an email.

4. We need to set up mail server to send, receive and to explore various activities associated with an email.  The other related purpose servers like SMTP server, HTTP server , etc are also required to assist large organizations.  The mail server can be a stand-alone computer or a collection of computer and servers.

 5.  The executable files should be examined thoroughly in the server, it can be dangerous malwares.  The examination is mainly done by scanning for malicious words and sender address.  Since many mail providers does not allow executable files to send, so the attackers are using other files also as a carrier of the malwares, so now every emails should be subject to deep examination using some malware scanner.  

6.   By the time of examination the some of the legitimate mails may also come under the suspect list so further check is needed there.  At the same time the attacks can be from legitimate sources also this could be go un-noticed; this should be also a challenge to face in the stage of e-mail examination.

8 0
4 years ago
During this project, you will prepare a short business report. You will accomplish the following during this section of the proj
german

Answer:

I can't tell you mine because that would be plagiarism but here's some ideas

Title Page. Every business report should feature a title page. ...

Summary. ...

Table of Contents. ...

Introduction. ...

Methods and Findings. ...

Conclusions and Recommendations. ...

References. ...

Appendices (If Applicable)

Explanation: Hope this helps:)

3 0
3 years ago
Other questions:
  • Does anyone know a NC wise owl password I can use, it's an emergency!! I can't ask my school because they are closed and I need
    12·1 answer
  • Ryan has created a Word document to be used as a review quiz for students in a classroom setting. The document contains both que
    6·1 answer
  • Truncation is a keyword search technique that helps you find useful variations of a term or terms. You want to find books on the
    5·1 answer
  • 1. What is an advantage of the PCIe bus over the PCI bus?
    9·1 answer
  • Explain what it means to have good file management skills.
    10·1 answer
  • All systems have ___________.
    9·2 answers
  • How to manufacture an ict application?
    15·1 answer
  • What is wrong with the following C++ code? How would you fix it? int sum; for (int i=0; i<1000; ++i) sum += i; { printf("Sum
    5·1 answer
  • The specific instructions that a computing device needs to boot up and control the hardware
    12·1 answer
  • A co-worker is called away for a short errand and leave the clinical PC logged onto the Confidential Information System. You nee
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!