1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
3 years ago
6

Use Spreadsheet Functions and Formulas

Computers and Technology
1 answer:
11Alexandr11 [23.1K]3 years ago
8 0

Answer:

ok

Explanation:

You might be interested in
Help please will give brainliest!!!!!!!!!
Shkiper50 [21]

Answer:

Take a String.

Convert it into array of characters.

Apply for loop till length of char array.

Using isDigit() method we can check the digits in string.

If isDigit() will return true then print that index value.

That digit is in char form. ...

Using sum variable, we will sum it.

Explanation:

4 0
3 years ago
A workstation’s user prefers KDE over GNOME. Which login manager can this user run to ensure direct login to KDE?
Mice21 [21]

Answer:

B. KDM

Explanation:

The KDE display manager (KDM) was developed for the KDE desktop environment, while the GDM is a display manager for the gnome desktop environment.

The XDM display manager is used by the Linux operating system when a specific desktop environment is not chosen.

3 0
4 years ago
Madison works for Google as an Ethical Hacker. Madison main job responsibility is
Ivenika [448]

Answer:

to evaluate the security and identify vulnerabilities of a business

Explanation:

Madison is an ethical hacker (white hat hacker), meaning she is hired by companies to make sure that "evil" hackers (black hat hackers) can't hack into their websites.

7 0
3 years ago
Read 2 more answers
The advantage of a digital camera in taking nighttime photographs is that you can see
stepan [7]

Answer:

Ima say true

Explanation:

7 0
3 years ago
Internet Security: How can you work securely on the internet? What actions should be avoided and what are the pitfalls?
Cerrena [4.2K]

Answer:First of all, to work safely at the internet you should avoid any not secure page, and if you can’t do that, avoid entering stuff such as credit cards or passwords on this sites. Now, to work safely it’s recomendable to have a VPN(virtual private network), that hides your IP direction.

Explanation:

8 0
3 years ago
Other questions:
  • Short Answer: Computer models and simulations are used to formulate, refine, and test hypotheses. Describe a scenario that could
    8·1 answer
  • Which of these describes the functionality of a database? Check all of the boxes that apply.
    10·2 answers
  • What effect does screen resolution have on how graphics are displayed?
    7·1 answer
  • What are the similarities between data mining and data analytics
    11·1 answer
  • Consider sending a 2400-byte datagram into a link that has an mtu of 700 bytes. suppose the original datagram is stamped with th
    10·1 answer
  • Code in Java:
    6·1 answer
  • When you get a new sim card do it come with a new number or do you have a activate the phone and get a new number in store ?
    9·1 answer
  • You are the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about sl
    7·1 answer
  • You have an application running on multiple ec2 instances, however every time an instance fails, your users complain that they l
    7·1 answer
  • From the introductory conversation chip and anna shared, which elements mentioned might suggest the use of case tools?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!