1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zheka24 [161]
2 years ago
12

What is the purpose of the ISOWEEKNUM function? determines how many workdays are in a certain week determines how many workdays

are in a certain month determines what day of the year that date is determines what week of the year that date is
Computers and Technology
2 answers:
ivanzaharov [21]2 years ago
5 0

Answer:

It's D

Explanation:

Likurg_2 [28]2 years ago
5 0

Answer:

its D on edg

Explanation:

You might be interested in
Who was the first person to make a portable computer?
Bad White [126]
It was invented by Osborne<span> Computers</span>
8 0
3 years ago
To use   ( 2 complement ) answer it (101101)2 – (1100)2 =   (                    )2
Tju [1.3M]

Answer:

2(101101) - 2(1100) = 200002

Explanation:

the text is everywhere don't know what to answer

5 0
2 years ago
Most network behavior analysis system sensors can be deployed in __________ mode only, using the same connection methods as netw
soldier1979 [14.2K]
Most network behavior analysis system sensors can be deployed in passive mode only, using the same connection methods as network based idpss. Idps works as a network or host based systems. Most Nba sensors can be deployed in passive mode only too. The Nba examines the network traffic.
7 0
2 years ago
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
3 years ago
You have a Windows system that has both wired and wireless network connections. The wired connection is on the internal private
Oksana_A [137]

Answer: D. Enable the remote Assistance exception only on the private profile

Explanation:

4 0
2 years ago
Other questions:
  • HURRY
    5·1 answer
  • What is the maximum upload speed you can get on an isdl internet connection?
    9·1 answer
  • Why did artists use pinhole cameras during the renaissance?
    8·1 answer
  • Which tool can you use in spreadsheet software to display only specific data values?
    9·1 answer
  • What development in operating systems happened between the years 1990 and 2000?
    15·1 answer
  • The information provided in text aids can help us to understand a text’s content before we even read it.
    8·1 answer
  • What does it mean to say that data in an Excel table is “dynamically linked” to a chart? What are the advantages of this feature
    5·1 answer
  • Difference between if then and if then else statement ​
    14·1 answer
  • If you have limited means, you...?
    9·1 answer
  • Discuss new concepts that you have learned about Cisco Devices and how they will be helpful in the workplace.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!