1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
3 years ago
9

What type of program is Microsoft® Excel®?

Computers and Technology
2 answers:
8090 [49]3 years ago
7 0

Answer:

the answer is spreadsheet application. I hope it helps

nekit [7.7K]3 years ago
7 0

Answer:

Spreadsheet

Explanation:

It's a spreadsheet.

You might be interested in
Describe a situation when you would use a conditional statement in a program. Describe the action that would occur when the cond
kramer

Answer:  Conditional statements are just true false statements

Explanation:

Let's say there's a kpop band burglarizing my house and I have a super AI that detects if a kpop band is my house through cameras. What it would do is change a variable "kpopBandInHouse = False" to True. I would then have an if statement next with a custom function:

if kpopBandInHouse == True:

   nukeHouse()

So if the conditional statement is true, it nukes my house. It is false, it does not nuke my house.

7 0
3 years ago
Progressive places its messages on local radio stations and in the yellow pages of the phone book. These communications are dire
Alexandra [31]

Answer: Receiver

Explanation:  

The receiver basically is used in the communication channel where the person decode its output and message in the form of useful data or information.

The main function of the receiver is to provide the path between the transmitter as an output and receiver as an input. The receiver basically process the received signal for recovering the proper message signal. It basically receive the input signal and covert it into useful data.

7 0
3 years ago
A public key is part of what security measure?
lord [1]
A public key or the asymmetric key which is used for the authentication process. It consists of a pair of keys in which one key encrypts and the other decrypts. It come under Public Key Infrastructure (PKI) and is a part of INFORMATION SECURITY measures. PKI is the management solution for the keys.
6 0
3 years ago
Which type of malware self-replicates between computers (from one computer to another)?
kramer
A "worm" is a self-replicating malware.
6 0
4 years ago
30points!!!! Plz answer quickly
stich3 [128]

Answer:

center

Explanation:

that is the focal point

3 0
3 years ago
Read 2 more answers
Other questions:
  • Inserting diagrams into documents can help readers better understand document text. True or False?
    10·1 answer
  • Pauline is a manager of a team in a large website design firm. Her team members come from diverse cultural backgrounds. The perf
    15·1 answer
  • Dayla is concerned about managing her digital footprint. What does she mean by this? *
    7·1 answer
  • The write-ahead logging (WAL) protocol simply means that Select one: a. the log record for an operation should be written before
    7·1 answer
  • Choose two technologies that you think would help the company meet its goals. Then fill in the chart below to compare the techno
    11·2 answers
  • What is the output of the code?
    15·1 answer
  • List the four types of hardware​
    10·1 answer
  • (in order of a-z)
    12·1 answer
  • there are these numbers that I've seen before but I don't know what they mean can someone help. I will give brainiest
    8·2 answers
  • The following image shows the number of orders Company A received in 2015-2020. A financial analyst wants to calculate the year-
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!