1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denpristay [2]
3 years ago
9

Although it is not a term Excel uses, how do most people think of Excel?

Computers and Technology
1 answer:
kobusy [5.1K]3 years ago
5 0

They think of it as a spreadsheet

You might be interested in
Which statement is true about biometrics as an authentication method?​
Irina-Kira [14]

The statement is true about biometrics as an authentication method in options b and c.

<h3>What is Biometrics?</h3>

Biometrics is the measurement worried in measuring behavior or physiological traits of the human being. It is used for verifying the identification of a specific man or woman. It is probably operated in modes, particularly authentication and enrollment.

The complete question is :

Which of the following are true in biometric systems?

  1. a. For authentication application, a user template is compared against a single template stored in the database.
  2. b. For verification/identification application, a user template is compared against all the templates stored in the database.
  3. c. Multimodal biometrics is used to improve accuracy.
  4. d. None of these.

In the first mode, the facts is used and proven to test who the man or woman is. The second mode is obtaining the man or woman's facts and storing it in a database. Usually, multi-version biometrics are used for enhancing popularity accuracy.

Read more about the authentication :

brainly.com/question/25689052

#SPJ1

3 0
2 years ago
When programming, the word "execute" means which of these?
Inga [223]

Answer:

to run!

Explanation:

hope this is helpful!

7 0
3 years ago
IPv6 can use a DHCPv6 server for the allocation of IPv6 addressing to hosts. Another IPv6 addressing option utilizes the IPv6 Ne
anzhelika [568]

Answer:

Following are the answer to this question.

Explanation:

It is a mechanism, that is also known as EUI-64, which enables you an automatic generation of its specific host ID. It using the device on the 48-bit MAC address, which helps to construct the special 64-bit host ID. It also helps you to build a DHCP-type IPv6 network, that's why we can say that the above-given standard is widely used to create a 64-bit host ID on IPv6 servers.

3 0
3 years ago
Which of the following is the most abstract?
marysya [2.9K]

D. The word "food" is the most abstract because it is the least specific and does not specify what food it is exactly.

Hope this helps!! :)

4 0
3 years ago
Read 2 more answers
Which of the following is the shortcut key combination for pasting copied text?
lys-0071 [83]
Ctrl + v pastes copied text, ctrl + p brings up a print menu, ctrl + x cuts and copies highlighted text, while ctrl + c copies the highlighted text.
3 0
3 years ago
Read 2 more answers
Other questions:
  • How must you rect to a flashing<br> Yellow traffic light?
    9·1 answer
  • Jessica finds out that the government introduced a new trade policy that will increase import tariffs. She calls for a meeting o
    15·1 answer
  • A vertical curve means that any change in the Aggregate Price Level will have what result?
    15·1 answer
  • Explain why Windows and Linux implements multiple locking mechanisms. Describe the circumstances under which they use spinlocks,
    13·1 answer
  • "When you can control devices and appliances by apps installed on your smartphone or tablet, you are said to have"
    6·1 answer
  • Write an if-else statement for the following: If user_tickets is less than 5, assign 1 to num_tickets. Else, assign user_tickets
    15·1 answer
  • What is the purpose of a Post Mortem Review? (5 points)
    5·1 answer
  • What type of technology we need to use in order to make sure that users can freely room from one room to another one without wi-
    14·1 answer
  • Can someone write this in java? Also, does anyone know how to do Edhesive assignments?
    15·1 answer
  • After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!