1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
3 years ago
6

What is the only way to remove a password encryption on an Excel file?

Computers and Technology
2 answers:
Olin [163]3 years ago
8 0

Answer:

D.) Enter the password to open the workbook, and delete the password created in the Encrypt with Password box.

Explanation:

Maybe but I'm not sure

(sorry if its wrong)

Aliun [14]3 years ago
4 0

Answer:

D

Explanation:

You might be interested in
How do I do this? I know the shapes and everything but how do I do b, d, and e?
aleksandr82 [10.1K]
Look in google for math flowcharts...it will appear easily.
4 0
3 years ago
Select all the mistakes in the following: There may be more than one.
sdas [7]

The if statement should have two equal signs, the elseif should be elif, and the else statement should have a colon at the end of it.  There might be more errors in the indentation but I cant know unless I see a picture of the problem. The print statement should be indented into the if, elif, and else statements.

4 0
3 years ago
Which security measure provides protection from IP spoofing?
anyanavicka [17]

Answer:

An SSL also provides protection from IP spoofing.

8 0
3 years ago
Difference between TIFF and BMP
Lina20 [59]

Answer:

Both TIFF and BMP are bitmap files, but TIFF files contain tags with additional information, like color space, resolution and print size, and can have 16-bit/channel depth (BMP's are limited to 8 bit). Taking a step back, there's no significant problem with first-generation JPEG files which use moderate compression.

Explanation:

4 0
3 years ago
________________ are piece of programs or scripts that allow hackers to take control over any system.
Ber [7]

Answer:

Exploits

Explanation:

Exploits can be explained to be a piece of programmed softwares or scripts that can give hackers the opportunity to take control over any system and exploit this system's vulnerabilities. The vulnerability scanners that hackers use includes, Nessus, Nexpose e.tc.

They use these scanners above to search for vulnerabilities.

3 0
3 years ago
Other questions:
  • Java
    13·1 answer
  • Before entering a loop, the first input, or ____, is retrieved.
    14·1 answer
  • The narrative structure of the popular movies can be broken down into
    15·1 answer
  • Write a function "nonRepeatings" that takes a string "s3" and returns the non-repeating characters in this string. Sample Input
    11·1 answer
  • What is output by the following C# code segment?int temp;temp = 180;while ( temp != 80 ) {if ( temp > 90 ) {Console.Write( "T
    7·1 answer
  • Part 1: 1) Write a C program getPhoneNumber.c that accepts a phone number from the user in the form XXX-XXX-XXXX, and then displ
    12·1 answer
  • What is extraction, transformation, and loading? Group of answer choices It is a process of entering data, tracking data, and lo
    5·1 answer
  • Who still plays old Nintendo 64 games?
    6·2 answers
  • Which examples demonstrate common qualifications for Marketing Information Management and Research careers? Check all that apply
    9·2 answers
  • Help I will mark brain list I promise!!
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!