1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
3 years ago
13

A10:A20 Refer to values in

Computers and Technology
1 answer:
Keith_Richards [23]3 years ago
8 0
The range of cells in column A and rows 10 through 20
You might be interested in
What mass of nh3 can be made from 35g of n2?
Anton [14]
 <span>14 g N in 17 g NH3 
so 35 g N will make 17*35/14 = 42.5 g</span>
3 0
3 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
Who is demonstrating entrepreneurship?
Taya2010 [7]

Answer: D: A recent graduate makes money helping teachers sell their lesson plans online.

Explanation: I am in accounting and have taken it for 3 years.

4 0
4 years ago
Assume that the ciphertext C is computed from the plaintext P by C= P ⊕ K1 ⊕ K2 , where K1 and K2 are the encryption key and ⊕ d
Sedbober [7]

Answer:

K1 ⊕ K2 = 9

Explanation:

Since 5 ⊕ K = 12, K must be 5 ⊕ 12 = 9.

But there are supposedly two encryptionkeys, we cannot know their individual value, only that K1 ⊕ K2 = 9.

That makes this a bit weird question.

4 0
4 years ago
What do the points on this website do?
DanielleElmas [232]

Answer:

They allow you to ask more questions and also your rank goes up or down.

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Terry came into work and turned on his computer. During the boot process, the computer shut down. When he tried again, the compu
    14·1 answer
  • Below is a sequence of 32-bit memory address references observed during the execution of an application, and given as word addre
    7·1 answer
  • People with healthy media diets:
    12·1 answer
  • What is the main function of the motherboard?
    12·1 answer
  • The central device on a network that provides a common connection point for nodes on that network is called the
    8·1 answer
  • Computers store temporary Internet files in the Recycle Bin. These files take up space and slow down a computer. Which tool can
    10·1 answer
  • Sandra wants to have her new technology up and running as soon as possible. She is looking for a tool that she can
    8·1 answer
  • A _________________________ can use SOAP headers to carry meta information in its messages. A. Web service B. REST Service C. Co
    14·1 answer
  • I will give brainliest !!
    15·1 answer
  • Hi this is for computer and technology experts out there but can someone tell me why my dell computer charger wont work please h
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!