1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
never [62]
3 years ago
12

which of these is another name for a pre- written formula a.reference b. function c. value d. selection​

Computers and Technology
1 answer:
sineoko [7]3 years ago
6 0

Answer:

the answer is b. function

You might be interested in
Janet manages the security of the database servers at the mortgage company where she works. The servers are Windows Server 2016;
Mariulka [41]

Answer:

encrypted file system (EFS)

Explanation:

The Encrypting File System (EFS) on windows is a Microsoft feature that help store sensitive file or information on a hard disk in an encrypted format so as to protect it from attackers or any other unauthorize individual. The EFS uses a combination symmetric key encryption and public key technology to protect the files, it is then encrypted with a symmetric algorithm known as DESX.

3 0
3 years ago
Explain what happens if you try to open a file for reading that does not exist.
ZanzabumX [31]

Answer:

Exception is thrown and the file is created with 0 length.

Explanation:

While opening a file there is an error occur which shows the file does not exist that means an  exception is thrown.

And this error can be occur when the size of the file is very very low means the file is a size of 0 length. So to avoid this error we have to exceed its length from the zero length.

8 0
3 years ago
Which one of the following rules for selecting a password is the best?
horsena [70]

Answer:

(b) 7 characters: 4 Numbers, 1 Lowercase Letter, 1 Uppercase letter, 1 Symbol

Explanation:

The best rule that makes a password great is that rule that increases the entropy of the password. The entropy of a password is the measure of how easy it is for the password to be cracked e.g by guessing, by brute force cracking, by dictionary attacks and other related cracking methods.

A rule that makes use of a logical combination of the four types of characters - digits, lowercase letters, uppercase letters and special symbols - gives a greater strength to the password than the rules that just make use of the some of the four types of characters.

Increasing the length of the password too is a great way of increasing the entropy of the password. But then, if there is a trade-off between length and combination, the latter is better.

3 0
3 years ago
Read 2 more answers
What is the name for software designed to find and open Web documents?
Liono4ka [1.6K]
It's C.spider software purpose is to find/view web documents.
7 0
3 years ago
What did Adam and Eve look like?
Nata [24]
No one could possibly know, unfortunately.
6 0
3 years ago
Read 2 more answers
Other questions:
  • How do type declaration statements for simple variables affect the readability of a language, considering that some languages do
    10·1 answer
  • Notes page view and Outline view are found in the<br> tab.<br> File<br> O Status<br> View<br> Page
    8·1 answer
  • A service provider, hardware, and web browser are needed to connect to __________.
    8·2 answers
  • Name three actions you can perform on an inserted image.
    7·2 answers
  • Which phrase is a comparison operator for inserting a not equal to argument in an IF, COUNTIF or SUMIF function? &lt;= &lt;&gt;
    9·1 answer
  • Different video files and ______ can cause compatibility issues to arise between computer systems.
    8·1 answer
  • Programmers should strive to _____. increase coupling increase cohesion both of the above neither a nor b
    7·1 answer
  • When you make a DNS query, where does your computer first check to find an IP address to name mapping?
    8·1 answer
  • URGENT!!! Steve wants to change shooting and exposure settings while on his photo shoot. Which camera part will allow him to do
    12·2 answers
  • Frank enters "1" in the field for postal code. What is frank most likely trying to do?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!