1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skad [1K]
3 years ago
15

What are styles? built-in conditional formatting rules formatting applied with the Format Painter defined combinations of format

ting cells that were created using the AutoFill feature
Computers and Technology
2 answers:
Contact [7]3 years ago
8 0

<em>ANSWER</em>

<em>DEFINED COMBINATIONS OF FORMATTING</em>

Shkiper50 [21]3 years ago
5 0

Answer:

c

Explanation:

You might be interested in
A sample member of the list data is a1 = ['male', True] where the second item is True if the person is on the phone.
Ira Lisetskai [31]
Answer:

0

Explanation:
In the lists, indexation starts from 0, because of that in if statement we compare item[0] which is 'male' and 'male', and then males is itterated within for loop.
8 0
2 years ago
Read 2 more answers
Analyze the following code. public class Test { public static void main(String[] args) { double radius; final double PI= 3.15169
sergiy2304 [10]

Answer:

The output of the given code as follows:

Output:

Area is: 12.60676

Explanation:

In the given code some information is missing so, the correct code to this question can be described as follows:

Program:

public class Test //defining class  

{

   public static void main(String[] args)//defining the main method

   {

       double radius= 2; //defining double variable radius

       final double PI= 3.15169; //defining double variable PI

       double area = radius * radius * PI; //defining double variable area that calculates values

       System.out.println("Area is: " + area); //print values

   }  

}

Explanation:

  • In the given java code a class "Test" is defined, in which a double variable "radius" is defined, which holds a value, that is 2.
  • In the next step, a double constant variable, that is PI is defined, that holds a value, that is "3.15169".
  • Then another double variable area is defined, that calculates the area value, and prints its value.
4 0
3 years ago
You company hired you to build a network. List of technical question that you will ask?
vredina [299]

Explanation:

1. How many computers do you want to connect or how big the network should be?

This would tell us what kind of a network need to be built. It can be LAN/MAN/WAN

2. The location where network needs to be built?

We have to check the geographic condition too before creating a network

3. What is the budget?

Based on the budget only, we can decide the wires to be used if require we can negotiate the budget so that we can create effective network

4. Will I get an additional resources to work?

This is essential to estimate the time that is required to complete the task.

5. When the project needs to be completed?

This is crucial because a business might be planned thereafter.

6 0
3 years ago
Which technology can be used as a defense against dos and ddos syn flood attacks?
Montano1993 [528]
In terms of websites, there's a service called cloud flare which can prevent DDOS attacks in websites. Other applications you would have to look up. Hopefully this helps!
6 0
3 years ago
(True/False). In an "ID" column with the data type INTEGER PRIMARY KEY, each value entered for the ID must be unique.
musickatia [10]

Answer:

The answer is "True".

Explanation:

  • The key to a relational database that is unique for each data record is a primary key, also called a primary keyword.
  • This unique identifier, including a driver's license name, telephone number, or vehicle identification number. This is an identifier (VIN).
  • There must always be the only primary key in such a relational database.
  • This is a specific relational database field (or column combination) that identifies each table entry in a unique way.
  • It utilized it to swiftly analyze the data within the table as a unique identifier.
5 0
2 years ago
Other questions:
  • The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont
    6·1 answer
  • When I comes to saving money, what is good rule of thumb
    5·1 answer
  • Forms often allow a user to enter an integer. Write a program that takes in a string representing an integer as input, and outpu
    11·2 answers
  • How should tools be stored <br>​
    13·1 answer
  • The following program is run. Then the user clicks the "bottomButton" TWO TIMES. What will be displayed in the console?
    6·2 answers
  • Who wants brainlyest! NO LINKS how do you message someone on brainly
    10·2 answers
  • Binary is best interpreted by a computer because ​
    12·2 answers
  • Is this statement true or false? Title text boxes on every slide must be the same format. True false.
    8·2 answers
  • How to connect two routers wirelessly to extend range.
    15·1 answer
  • Mario is designing a page layout for a sports magazine, and he decides to add the image of a cyclist. Which principle of page la
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!