1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antoniya [11.8K]
3 years ago
7

What is spreadsheet? Give any two such exampleAnswer plssss​

Computers and Technology
1 answer:
marissa [1.9K]3 years ago
7 0

Answer:

<em>The </em><em>definition</em><em> </em><em>of </em><em>spreadsheet</em><em> </em><em>is </em><em>a </em><em>piece </em><em>of </em><em>paper </em><em>or </em><em>a </em><em>computer </em><em>program </em><em>used </em><em>for </em><em>accounting </em><em>and </em><em>recording</em><em> </em><em>data </em><em>using </em><em>rows </em><em>and </em><em>columns </em><em>into </em><em>which </em><em>information</em><em> </em><em>can </em><em>be </em><em>entered </em><em> </em><em>in </em><em>Microsoft</em><em> </em><em>Excel </em><em>is </em><em>a </em><em>program </em><em>in </em><em>which </em><em>you </em><em>en</em><em>t</em><em>er </em><em>data </em><em>into </em><em>columns </em><em>this </em><em>an </em><em>example</em><em> </em><em>of </em><em>sp</em><em>r</em><em>eadsheet </em><em>program </em><em>or </em><em>noun </em>

<em><u>this </u></em><em><u>answer </u></em><em><u>might </u></em><em><u>he</u></em><em><u>l</u></em><em><u>p </u></em><em><u>u</u></em>

You might be interested in
A type of graph that uses horizontal bars to compare data is called a
sergiy2304 [10]
The answer is A) a bar graph

6 0
3 years ago
Read 2 more answers
An algorithm that could execute for an unknown amount of time because it depends on random numbers to exit a function may:______
Anna007 [38]

Answer:

c. suffer from indefinite postponement.

Explanation:

Algorithm is a set of rules that are followed in calculations or other problem solving operation by a computer. An algorithm may execute for unknown amount of time and it may suffer indefinite postponement. Algorithm depends on random numbers and it can execute continuously.

8 0
3 years ago
"The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
alexdok [17]

Answer:

D

Explanation:

Cause You Have To Decode It To Get To The Memory In The First Place

3 0
3 years ago
Ushahidi is a crisis-mapping tool that makes information instantly available to anyone in the world. T/F
andrezito [222]

Answer: True

Explanation: Ushahidi is technology that is responsible for the dividing the work and gaining the outcomes from the public accounting ,publishing, social activities for the instantly making the information available towards the world.

It is a non-profit organization that is responsible for the distribution of any products to clients for the crisis mapping mechanism and gaining the feedback reports.

4 0
3 years ago
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
Zepler [3.9K]

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the output of the following program?
    8·1 answer
  • Your game design company has recently asked all employees to use a specific personal information management application (PIM) to
    6·1 answer
  • Which type of network cover a large geographical area and usually consists of several smaller networks, which might use differen
    5·1 answer
  • Which of the following patterns of cell phone use can be observed in this chart
    12·1 answer
  • If a simple pipelined processor is super-pipelined by a factor of 3 (the ALU takes 3 cycles instead of one for the smallest oper
    15·1 answer
  • Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form compl
    11·1 answer
  • Greg wants to check the amount of requests his website receives. What test can he use?
    6·1 answer
  • How is the architecture converted into software code? Elaborate the steps its passes through with help of examples / Diagram.
    15·1 answer
  • A 4"x6" photo is digitized using 10,000 pixels. An 11"x7" photo is digitized using 30,000 pixels. Which image will have the bett
    6·1 answer
  • Writing queries in sql to compile data from a database is related to the physical level of databases true or false?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!