1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karolina [17]
3 years ago
9

Awnser pls I will appreciate it

Computers and Technology
1 answer:
zubka84 [21]3 years ago
3 0

Answer:

B

Explanation:

You might be interested in
Many of the special staff teams require leadership training, which is offered to staff with more than 1 year of service at Camp
Sveta_85 [38]

Answer:

The answer to this question can be defined as follows:

Explanation:

In the given question attachment file is missing so, following the code to this question:

using function IF:

=IF(Logical test, how to do it when testing is right, how to do it when testing is wrong)

In this scenario, a leader development Worker should pass 2 tests

In the First test may not finish his training

If yes-" satisfied"  

It is not true, it will go to 2nd test  

In the second test, If employee served a service period of even more than 1 year (to be performed in a first check if not correct)

If, It is yes=" yes"  else  not ="No"  

= IF(Leader Training = Yes, "Completed," IF(Service time> 1," Yes ","No")  

That's means,  

The sort IF(I2 = "Yes","Completed"),IF(D2>1," Yes","No") must be used in cell M2)

Copy Cell M2 Then the selected M3 over M30

8 0
3 years ago
What is a protein called if it loses its shape?
hichkok12 [17]
When a protein is denatured, itloses its function. Examples: A denatured enzyme ceases to function. A denatured antibody no longer can bind its antigen.
7 0
3 years ago
Why does everyone refer to dogs as being loyal
LenKa [72]

Explanation:

Because they're like another member of the pack.

7 0
3 years ago
Read 2 more answers
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
3 years ago
Pressing the Backspace key deletes the text to the of the insertion point. The left or the right?
hodyreva [135]

The answer is:

Left

The backspace key only deletes whatever way the point is pointing to. In this case, it is to the left.

Correct me if i'm wrong.  

4 0
3 years ago
Read 2 more answers
Other questions:
  • The _______ valve protects the air pump from reverse-exhaust pressure.
    11·1 answer
  • What identifies available computers through the internet?
    14·1 answer
  • Please help
    14·1 answer
  • Give an example of an app, website, or a game that used addictive design. Describe three features of addictive design it uses.
    11·2 answers
  • Which scenario depicts an ethical workplace practice by a business owner? A. sharing personal information of its employees with
    8·2 answers
  • Hosts A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Sup
    10·1 answer
  • Write a pseudocode thats accept and then find out whether the number is divisible by 5 ​
    6·1 answer
  • This is in government
    15·1 answer
  • What can help an interface user understand or navigate an online interface?​
    15·1 answer
  • Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!