1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
8

1 : What format would you apply to give an entry the appearance of 12-Mar-2014

Computers and Technology
1 answer:
Arturiano [62]3 years ago
4 0

Answer:

1. Date 2. It will appear to the right of the selected column.

You might be interested in
What is the term for the era created by the digital revolution?
ollegr [7]
We are in the modern era and the information era
8 0
3 years ago
In a network, a computer that performs specific services for other computers on the network is called a
klio [65]
Motherboard or main sequence processor 
(either that  a mainframe or a server)
hope this helps

8 0
3 years ago
One of the factors that influence the effectiveness of chemical sanitizer works effectively between 13° C and 49° C​
12345 [234]

Answer:

temperature

Explanation:

Temperature is one of the three factors known to have remarkable influence on the effectiveness of chemical sanitizers. These sanitizers generally perform best at temperature range of 13 – 49 degrees centigrade.  

Also, contact time is one of the factors that is needed for the sanitizers to effectively kill the microorganisms. The item to be cleaned should come in contact with the chemical for the recommended period of time.

3 0
2 years ago
What can you do if brainstorming only gives you a small or incomplete idea?
Grace [21]

Answer:

D. All of the above

Explanation:

5 0
3 years ago
In computer science, what does the word security mean?
zepelin [54]

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

4 0
3 years ago
Other questions:
  • Which ipv6 router message is sent via multicast with a scope of link-local with the expectation that all local routers will iden
    5·1 answer
  • Use the RSA cipher with public key n = 713 = 23 · 31 and e = 43. Encode the word "KING" into its numeric equivalent and encrypt
    15·1 answer
  • DeShawn uses Google Ads. He wants to enable website call conversion tracking so he can see how his current ad campaign is drivin
    12·1 answer
  • How to connect an Apple Watch series 3 to your iPhone (ASAP)
    6·2 answers
  • What is the difference between the web and the internet?
    14·1 answer
  • The most useful index fossils are of organisms that are still alive today.
    11·2 answers
  • Which file format would be appropriate for web graphics​
    6·1 answer
  • First calculating device​
    12·2 answers
  • Suppose that a 64MB system memory is built from 64 1MB RAM chips. How many address lines are needed to select one of the memory
    11·1 answer
  • Helppppppppppp please
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!