1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stira [4]
3 years ago
12

Formatting means ____________

Computers and Technology
2 answers:
ArbitrLikvidat [17]3 years ago
4 0

Answer:

formatting is the style of the format of a computer document

trapecia [35]3 years ago
4 0
Lots of pusss is corect
You might be interested in
Which of the following correctly describes the Filter procedure for managing spreadsheet data? Check all that apply.
saveliy_v [14]

Answer:

Filtering procedure provides an essay and convenient way to visualize or work only with the data we desire without needing to delete those we do not need at that moment.

Filter allows you to view only the information you want to see. Only the required information is displayed at that moment once the filter criteria has been checked.

Filter temporarily hides rows of data that you do not need to view. Rows of data which aren't needed at the moment are temporarily hidden in other to allow user concentrate on the needed data.

Filter allows you to filter text and numeric data. Filtering allows for different filtering criteria, if the user requires working or viewing only on text or numeric data, it is possible with spreadsheet filter.

Explanation:

Filter allows you to view only the information you want to see.

Filter temporarily hides rows of data that you do not need to view

Filter allows you to filter text and numeric data.

5 0
2 years ago
Read 2 more answers
You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You w
Schach [20]

Answer: Proxy server

Explanation: Proxy server is a type of server that is acts as interface between the network on huge scale and any local network. This server provides the feature of security, operations, privacy etc in the network system. They also help in improving the performance of the network.

It can work as the web filter to eliminate the unwanted websites.They acts as the gateway by  observing the website that is being browsed by the other user.Thus installation of proxy server should implemented on the organization.

8 0
3 years ago
Your manager asks you to calculate the sale price if the product is marked down 20 percent. You enter the original price in cell
padilas [110]
The answer is =A2*.80
7 0
3 years ago
Read 2 more answers
data is transmitted in plain text. this is a: group of answer choices brute force attack session hijacking dictionary attack cry
Anton [14]

The data that is transmitted in plain text is option D: cryptographic failure.

<h3>An established plain text only assault is what?</h3>

The known-plaintext attack (KPA) is a cryptanalysis assault type where the attacker has access to both the encrypted and plaintext versions of the data (also known as a crib) (ciphertext). These can be used to reveal additional hidden information, including code books and secret keys.

Therefore, Plaintext in the context of cryptography typically refers to unencrypted data that is being prepared for input into cryptographic techniques, typically encryption algorithms. Typically, unencrypted data transmission or storage falls under this category.

Learn more about data transmission from

brainly.com/question/10564419
#SPJ1

5 0
1 year ago
Natalie enjoys talking to people and helping them with their problems. Her friends always tell her that she’s a good listener. B
Akimi4 [234]

Answer:

C and D

Explanation:

The other 3 answers don't even involve talking.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Can you please answer these questions for me: Is it illegal to copyright? What does it mean to get copyrighted? What are example
    12·2 answers
  • Do you believe that oop should be phased out and we should start working on some alternative?
    13·1 answer
  • Assume that a is an array of two or more integers, and that b and c are integers.
    13·1 answer
  • What is most important for you to choose before you build a network?
    6·1 answer
  • In this scenario, hackers launch cyber-attacks that affect several parts of the nationâs financial infrastructure over the cours
    8·1 answer
  • Your _______ can help block inappropriate content online.<br> 1. web browser<br> 2. Password
    14·1 answer
  • 1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an eve
    13·1 answer
  • Make the list of menu icon in MS Excel<br>​
    8·1 answer
  • READ CAREFULLY! There is a difference between moving and copying files.a. Create a directory named . For example, mine would be
    7·1 answer
  • __________ are very simple devices that connect network components, sending a packet of data to all other connected devices.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!