1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
3 years ago
8

Which method is used to edit a function that has been created and inserted into a cell?

Computers and Technology
2 answers:
Softa [21]3 years ago
8 0

Answer:

ITS D

Explanation:

I got on excel and tested all of them.

(they all work)

8_murik_8 [283]3 years ago
4 0

Answer:

A

Explanation:

A

You might be interested in
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers
Llana [10]

Answer:

Broadcast message

Explanation:

The network models like OSI and TCP/IP suites have standard layers and protocols that governs the communication of end devices in a network.

The TCP/IP suite model has four layers which are application, transport, internet and network access layers. The network access does the work of both the data-link and physical layer of the OSI model.

When the packet is encapsulated in a data-link header and trailer, and needs to be sent to another unknown host, a broadcast message is sent to all the computers in the network to retrieve the remote host address for a unicast transmission to take place.

3 0
4 years ago
Read 2 more answers
Describe at least one reason why transitioning from the Cisco implementation of STP to the Cisco implementation of RSTP is seaml
kherson [118]

Answer:

STP mainly uses 5 states in a network, in which some states are replaced in RSTP which improves the time efficiency.

Explanation:

STP mainly uses five states i.e.  Learning, Listening, Blocking, Disabling and Forwarding to overcome the problem of collision in a network.  

RSTP replaced the three states of STP i.e listening, learning, and blocking by Discarding, which results in the time efficiency as compared to STP.  

As STP takes minutes to complete the network inter connectivity, RSTP completes it in seconds.

This is one of the main reason why an administrator want to change to RSTP.

6 0
3 years ago
If you define a function name, and it turns purple instead of blue, what should you do?
xenn [34]
You should change the name of the function
3 0
3 years ago
En un taller tienen dos taladros de sobremesa de 600 w de potencia, una sierra de calar de 500 w y cuatro soldadores de 50 w. Lo
sveticcg [70]

Answer:

El consumo del taller es de 3.7 kw/h.

Explanation:

Dado que el taller posee dos taladros de sobremesa de 600 vatios de potencia, que son utilizados durante 2 horas diarias; una sierra de calar de 500 vatios de potencia que es utilizada durante 1 hora diaria, y cuatro soldadores de 50 vatios que se utilizan durante 4 horas diarias, para medir el consumo diario de energía del taller es necesario realizar el siguiente calculo:

600 x 2 x 2 = 2,400 vatios de consumo taladros

500 x 1 x 1 = 500 vatios de consumo sierra de calar

50 x 4 x 4 = 800 vatios de consumo soldadores

2,400 + 500 + 800 = 3,700 vatios de consumo total

Pasado a kilovatios, el consumo del taller es de 3.7 kw/h.

4 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
Other questions:
  • The program prompts the user to interactively enter eight batting averages, which the program stores in an array. The program sh
    9·1 answer
  • With ____ editing, Word automatically displays a Paste Options button near the pasted or moved text.
    14·1 answer
  • A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when view
    7·1 answer
  • Concentric circles on a disk platter where data is stored;________
    8·1 answer
  • As part of the systems engineering development team, use IDEF0 to develop a functional architecture. The functional architecture
    13·1 answer
  • To change the name of a field, press and hold or right-click the column heading for the field, tap or click ____ on the shortcut
    7·1 answer
  • An airline has found about 7% of its passengers request vegetarian meals. On a flight with 166 passengers the airline has 16 veg
    11·1 answer
  • Which one is not the part of motherboard ?<br>O Registers<br>O<br>Bus<br>O<br>Port<br>O<br>none​
    14·1 answer
  • A mobile application delivers market predictions based on stock data from the stock market data platform. Knowing that the data
    12·1 answer
  • The average numbers of shares a piece of content receives is known as its:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!