1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
9

Cual es la estructura correcta de una formula en Excel

Computers and Technology
1 answer:
Anarel [89]3 years ago
8 0

Answer: hyghfdtuyeef

Explanation:

You might be interested in
Which of the following best describes what a long-term goal is?
melisa1 [442]
What are the options?
6 0
3 years ago
Anna is making a presentation on the top five most visited cities in her state. she wants to make sure that she does not put in
andrey2020 [161]
Outline View. This view shows only the text of all the slides in the presentation on the left pane, enabling Anna to see whether she has put too much information or not.  She can also directly edit the the text  and simultaneously see its effect on the slide.  
8 0
3 years ago
Read 2 more answers
Help please I would really appreciate <br>​
Dafna1 [17]

Answer:

the answer is address bar

3 0
4 years ago
Read 2 more answers
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
I need help on my new iPhone 7 that I got I transfer my Sim card from my Samsung But before And after I put my Sim card in it wa
g100num [7]

Answer:

Sometimes phones do this, did you take it to the phone store?

Explanation:

In order to send and receive iMessages to your iPhone.

iMessage must be enabled. By doing this, you will associate your phone number with the email address used for your Apple ID or iCloud account.

6 0
3 years ago
Other questions:
  • Commands are organized into tabs on the A. Ribbon. B. Quick Access toolbar. C. Status bar. D. ruler.
    13·2 answers
  • To define a c-string that will store students' last names of up to 25 characters in length, which is an appropriate statement?
    9·1 answer
  • What factor(s) should be considered when determining whether a business is too far based on the query and the user location? Sel
    14·1 answer
  • An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b)
    5·1 answer
  • Why can black holes not be seen?
    5·1 answer
  • In python:
    14·1 answer
  • अस्स्मन्चचरे ------------------- दृश्यते |
    8·1 answer
  • In client server network, there is no central server //// true or false​
    8·1 answer
  • A celebrity blogger you have followed for years advises readers to try a new beauty product. Before purchasing the product, a sa
    10·1 answer
  • Examples of applying successful visual design principles to bring a web page together are _________________. (Choose all that ap
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!