1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
3 years ago
6

Use Spreadsheet Functions and Formulas

Computers and Technology
1 answer:
11Alexandr11 [23.1K]3 years ago
8 0

Answer:

ok

Explanation:

You might be interested in
Which two options are negotiated via ncp during the establishment of a ppp connection that will use the ipv4 network layer proto
liberstina [14]
<span>NCP are protocols that are used for establishing PPP sessions. </span>During the establishment of a PPP connection that will use the IPv4 network layer protocol the following options are negotiated: the algorithm to compress TCP and IP headers and the IPv4 address used for routing IP over the PPP link.

6 0
3 years ago
Write a program to assign and display a string value to any variable of your choice
vazorg [7]

Answer:

How to create a string and assign it to a variable. To create a string, put the sequence of characters inside either single quotes, double quotes, or triple quotes and then assign it to a variable.

6 0
3 years ago
Evaluate if the following function is a good candidate to be placed in a library. Why or why not?
Anastaziya [24]

Answer:

No, this would not be a good candidate because it can't be used in creating new programs.

Explanation:

^

8 0
3 years ago
Read 2 more answers
In learning information security, it is important to understand that threats to your company's information assets are present 24
coldgirl [10]

1. Acts of human error

<u>Explanation:</u>

Insecurity their are many threats that make a desktop or workstation or laptop.  Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.

End-users have made sure all required service is activated and running in the organization.

The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.

8 0
3 years ago
Where do players resurrect if they have been destroyed in a game?
CaHeK987 [17]

Usually back to their start point. Or a random place on the map.

3 0
4 years ago
Other questions:
  • 9. Name at least two types of hard drives?
    6·1 answer
  • What view is In a presentation program displays your slides in full screen mode
    6·1 answer
  • What are the advantage of transistors over vacuum tubes?
    6·1 answer
  • I WILL MARK BRAINLIEST PLZ HELP
    5·1 answer
  • Question 4: What will be the output of the code? Show a complete analysis.
    6·1 answer
  • Write an expression using membership operators that prints "Special number" if special_num is one of the special numbers stored
    12·1 answer
  • Mac or PC (need opinions please)<br><br> Why did you choose Mac/PC?
    10·2 answers
  • Typing which capitals and exclamation points in an email is an example of
    14·1 answer
  • What is net pay?<br> What is net pay?
    11·2 answers
  • When we look for errors inside of our code on our own or with a partner , what is that called?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!