1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya692 [45]
3 years ago
8

ANSWER ASAP GIVING BRAINIEST FIVE STAR AND HEART!

Computers and Technology
2 answers:
makkiz [27]3 years ago
7 0

Answer:

A Formula is a method, statement, or procedure for achieving something, especially reconciling different aims or positions. A function is an activity or purpose natural to or intended for a person or thing. The difference between the two is a function is a piece of code that executes a predefined calculation, while a formula is something you create yourself.

Explanation:

vazorg [7]3 years ago
4 0

Answer : A Formula is a method, statement, or procedure for achieving something, especially reconciling different aims or positions. A function is an activity or purpose natural to or intended for a person or thing. The difference between the two is a function is a piece of code that executes a predefined calculation, while a formula is something you create yourself.

You might be interested in
What will be the value of “sumtotal” when this code is executed?
Lelu [443]

Answer:

2

Explanation:

if-else is the statement that is used for checking the condition and if the condition is True, then execute the statement otherwise not executed.

initially, the value of n1 = 3, n2 = 6, n3 = 2, sumtotal = 4.

after that, if statement checks for the condition.

3 != 4

condition is TRUE, then the statement sumtotal -= n3; will be executed.

write the statement in simple form:

sumtotal = sumtotal - n3;

so, sumtotal = 4-2 = 2.

after that, the program does not check the further and exit the if-else statement.

Therefore, the answer is 2.

4 0
3 years ago
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
4 years ago
True or False: If you take a course and do not pass it, you still get credit. I feel like it's false but i'm not sure. Can I get
Margaret [11]
Its true because even if you fail a course it shows on your transcript....

8 0
3 years ago
Read 2 more answers
A user can permanently remove a database record by clicking or tapping the ____ button on the navigation toolbar. a. Remove b. E
lana [24]

Answer:

The answer is "Option d".

Explanation:

In the database DELETE or delete is a keyword, that is used to eliminates one or more files from the table. This key is a part of SQL, that removes data when a specific condition is used otherwise, it will remove all documents, and other choices were wrong, that can be described as follows:

  • In option a, It is wrong because it is not a key, and it is no used in the database.
  • In option b, It is used to exit from the database, that's why it is wrong
  • In option c, It is not correct because it is used for freeing space in the database.
5 0
3 years ago
What is sodaglass in glass technology ​
IRISSAK [1]

also called lime, silica glass, is the most prevalent type of glass, used for windowpanes and glass containers (bottles and jars) for beverages, food, and some commodity items. Glass bake ware is often made of borosilicate glass.

8 0
4 years ago
Other questions:
  • Jen wants to protect the schools network from hackers,worms,and viruses.she also wants to regulate access to certain websites th
    15·2 answers
  • Why is it important to consider the readability of a Web page when selecting and applying a background color?
    12·1 answer
  • The web server software used has a significant impact on how a web site's web pages look on a user's computer.
    7·1 answer
  • Is social media and advancement of technology causing our society to become less social?
    13·1 answer
  • ____ is an approach to boundary spanning which results from using sophisticated software to search through large amounts of inte
    5·1 answer
  • _____ is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterp
    11·1 answer
  • All of these (except the ______) go unnoticed by the computer
    7·1 answer
  • You can enter _____ in a cell to display tomorrow’s date
    12·1 answer
  • Display the desktop without minimizing or closing any windows.
    6·1 answer
  • A _____ shows how data moves through an information system but does not show program logic or processing steps.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!