1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
15

Order the steps to use a logical argument as a rule type.

Computers and Technology
2 answers:
muminat3 years ago
6 0

Answer:

Click home tab, click conditional formatting, click new rule, use formula to determine

ELEN [110]3 years ago
3 0

Answer:

1. Home Tab

2. Conditional Formatting

3. New Rule

4. Formula

Explanation:

Just did it on Edge 2021

Plz click the Thanks button!

<Jayla>

You might be interested in
Question #8
White raven [17]

Answer:

The other person is correct the answer is 7

Explanation:

I got it right on edge

3 0
3 years ago
What is computer hadware​
Alex Ar [27]

Answer: like the monitor or the keyboard

Explanation: it is true i even looked it up and it was true

8 0
2 years ago
What type of Windows server has Active Directory installed and is responsible for allowing client computers access to domain res
Basile [38]

Answer:

Domain controller                    

Explanation:

  • A domain controllers is a server which acknowledges authentication requests and validates users access on the computer network in order to use the resources.
  • This is done by the domain controller by verifying the username and password.
  • It also allows user to access the other domain and also access the resources of other domain.
  • For example there is a network of multiple computers and each computer requires authentication i.e user is asked to provide the username and password.
  • Authenticating every computer and managing is not easy so a computer is appointed this task of authentication other computers.
  • This computer  is called domain controller which can easily maintain these authentication details of the users.
  • The authentication information (login details) of users, computers and shared resources is saved in Active Directory database.
  • If a user requests access to the resource via login then the login details (username and password) of the user should match with that stored in the Active Directory in order to grant access to the user.
  • Domain controller enables resources sharing and is good for large networks and provides with improved security.
4 0
3 years ago
Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
yulyashka [42]

Answer:

c. Two-factor authentication

Explanation:

Two-factor authentication is also known as 2FA. It is an extra form of security put in place aside the use of username and password to ensure the authenticity of someone trying to access an online platform with a registered account.

First the user enters his or her username and password, then they will also have to provide some extra information before finally gaining access. Such information could be ones place of birth, name of pet, something one has or know, etc.

2FA helps to still keep an account safe even if a device or password is been stolen. Two-factor authentication could be SMSbased, hardware token, software token, etc.

4 0
4 years ago
Which line of code could be used for a constructor?
uysha [10]

Explanation:

I think (first name last name id Num)

4 0
4 years ago
Other questions:
  • Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They d
    5·1 answer
  • Pick the JavaScript code for the following pseudocode. If age &gt;= 65 Then discountRate = 0.10 End If Group of answer choices
    12·1 answer
  • What part of the System Model is a Flow Chart primarily developed for?
    9·1 answer
  • How would you define a relational database ?
    12·1 answer
  • True or false questions. If a statement is false, you must explain the reason why it is false: a). Suppose that TCP is being run
    12·2 answers
  • Drew is creating a game that stops the timer when the hourglass
    15·1 answer
  • True or False
    9·1 answer
  • Java
    5·1 answer
  • Vector images take up much less space when saved to a computer or storage device because computers and storage devices just need
    14·2 answers
  • An Accenture healthcare client is interested in implementing an Artificial Intelligence (AI) solution to improve patient care, b
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!