1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
3 years ago
9

What type of program is Microsoft® Excel®?

Computers and Technology
2 answers:
8090 [49]3 years ago
7 0

Answer:

the answer is spreadsheet application. I hope it helps

nekit [7.7K]3 years ago
7 0

Answer:

Spreadsheet

Explanation:

It's a spreadsheet.

You might be interested in
What power points feature will you use to apply motion effects to different objects of a slide
neonofarm [45]

Answer:

Animation scheme can be used to apply motion effects to different objects of a slide.

5 0
3 years ago
What is application software used for
topjm [15]

Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets. A word processor could be classed as general purpose software as it would allow a user to write a novel, create a restaurant menu or even make a poster.

8 0
4 years ago
What type of font color should Kim select if she chooses a dark-colored design theme for her presentation?
Gnesinka [82]

ANSWER: Kim has chosen a dark-colored design theme for her presentation. She should therefore choose <u>a bright </u> font color that will <u>contrast with  </u>the background color.

5 0
4 years ago
Read 2 more answers
Complete the sentence to identify advantages of top-down programming design. Choose all that apply.
yanalaym [24]

Answer:The original choice to write apply_fg so that it accepts function arguments is a good one, because it increases interoperability. When the callable arguments to apply_fg use a single protocol, we can easily exchange them: #include <functional> float log2(float); int a = apply_fg(5.Of, int b = apply_fg(3.14f,

Explanation:

3 0
4 years ago
Read 2 more answers
Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti
givi [52]

The term vulnerability describes the issue that Adam discovered.

b. vulnerability

<u>Explanation:</u>

SQL injection attack is an attack in which an external party can execute SQL commands on the database that serves as a back-end for a particular website. The SQL commands can be used to modify the contents of the website, modify the records, delete the records, and retrieve confidential information as well.  

As Adam believes that the code has an issue that allows a SQL injection attack, the term that best describes the issue that he discovered is vulnerability. The website is vulnerable since the code does not have a proper procedure to tackle a situation of SQL injection attack.

7 0
3 years ago
Other questions:
  • The _____ is the area in Microsoft Excel where you can perform file commands such as Save, Open, and Print
    15·1 answer
  • Mathematical computations by a computer are faster than your quickest mathematical computations because the top speed of a neura
    13·1 answer
  • Which player type focuses on level progression?
    13·1 answer
  • If johnny has 800 socks and john has 1000 more how much does john have
    9·1 answer
  • What is the first step to creating a PivotTable?
    11·1 answer
  • Among the rights you have as a user of computing resources is the right to​ _______.
    12·2 answers
  • Which statement best describes antivirus software?
    13·1 answer
  • Durante 10s, la velocidad de rotación y el momento de giro de las ruedas de un coche eléctrico son 100 rpm y 1405,92 Nm, respect
    15·1 answer
  • Which computer peripheral is used when you would like to use a DVD or CD?
    12·2 answers
  • An instruction for the computer. Many commands put together to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!