1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lynna [10]
3 years ago
9

100POINTS!!!!

Computers and Technology
2 answers:
Anettt [7]3 years ago
6 0

Answer:

Is it a tool in the computer, pls make it clear

Nitella [24]3 years ago
5 0

Answer:

Explanation:

Which tool would you use to organize the list from fewest calories to most calories?

✔ sort by calories from smallest to largest

Which tool would you use to organize the list from most protein to least protein?

✔ sort by protein from largest to smallest

Which tool would you use to show only fruits with 4 or more grams of dietary fiber?

✔ filter

Which tool would you use to navigate to C5, the cell containing the grams of sugar for an orange?

✔ Go To

You might be interested in
which is the quickest way to change the font color in multiple, randomly located cells in a worksheet?
insens350 [35]
First select or highlight the rows or columns that you want to change the font color<span>. You can hold the ctrl key while select </span>multiple cells<span>. After, selecting you can now </span>change the font color<span> of everything you selected.</span>
6 0
3 years ago
Read 2 more answers
Your program has a two-dimensional array, scores. You are implementing your array with lists. Each member in the array is a pair
Viefleur [7K]

Answer:

scores.append(6,2)

Explanation:

This is a complicated question because in theory, scores.insert can also add values, but I am sure that the only line of code that would work is scores.append(6,2)

7 0
3 years ago
If given program is executed, what will be output?
iogann1982 [59]

Answer:

16 22 399 214 351

Explanation:

es 1 .22 399 480

3 0
2 years ago
data is transmitted in plain text. this is a: group of answer choices brute force attack session hijacking dictionary attack cry
Anton [14]

The data that is transmitted in plain text is option D: cryptographic failure.

<h3>An established plain text only assault is what?</h3>

The known-plaintext attack (KPA) is a cryptanalysis assault type where the attacker has access to both the encrypted and plaintext versions of the data (also known as a crib) (ciphertext). These can be used to reveal additional hidden information, including code books and secret keys.

Therefore, Plaintext in the context of cryptography typically refers to unencrypted data that is being prepared for input into cryptographic techniques, typically encryption algorithms. Typically, unencrypted data transmission or storage falls under this category.

Learn more about data transmission from

brainly.com/question/10564419
#SPJ1

5 0
1 year ago
Bob works in a small office with a network of computers. Bob, along with all the other employees, is responsible for securing hi
miskamm [114]

Answer:

False

Explanation:

When an employee becomes the one responsible for the security of His own computer then the scenario does not define Network security. Network security is a usage of hardware and related software to provide protection to the underlying network architecture from unauthorized access and other anomalies related to networks.

5 0
3 years ago
Other questions:
  • Of the different IRT roles, the _______________ is head of the team and issues the ultimate call regarding how to respond to an
    15·1 answer
  • Difference between multiterm access and single term access for webassign
    11·1 answer
  • Businesses use a fax cover sheet is to _____. provide detailed service and product information make sure message reaches the rig
    14·2 answers
  • Please answer this I know that no one else does but I can't think right now
    10·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    5·1 answer
  • Which one my guys I need help
    7·1 answer
  • Who Likes K-pop? Which group or groups do you like
    12·2 answers
  • What are the services offered by web-based email?​
    12·1 answer
  • What year did polaroid introduce one-step photography with the SX-70
    14·1 answer
  • Post back maintains view state by assigning the form values to a hidden form field named ____.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!