1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bezzdna [24]
3 years ago
14

________________, _______________ and ___________ are what you see when you open Excel

Computers and Technology
2 answers:
babymother [125]3 years ago
5 0
Volume , rows , and cells ! good luck
dexar [7]3 years ago
3 0
Columns, rows and cells.
You might be interested in
When a subdomain has been delegated to a zone on another server, the DNS server hosting the parent zone maintains only an NS rec
Vedmedyk [2.9K]

Answer:

True of False?

True

Explanation:

Different sub domains can be directed to different IPs servers but a client server cannot be forced to keep looking at name servers for additional records.

To delegate a subdomain to a zone on another server, one would need to add NS-records for the sub-domain name. This would point to the host names of the DNS servers hosting the sub-domain - in the parent zone.

In the "DNS records" window right-click the parent zone in the left list and select "New NS-record":

8 0
4 years ago
Write the difference between:
JulsSmile [24]

Answer:

RAM is used to store computer programs and data that CPU needs in real time. ... RAM data is volatile and is erased once computer is switched off. HDD,hard disk has permanent storage and it is used to store user specific data and operating system file

3 0
4 years ago
Read 2 more answers
Who is responsible for protecting the environment? a. Government b. Employers c. Employees d. Everyone Please select the best an
Veronika [31]

Answer:

A

Explanation:

Hope I helped

7 0
3 years ago
Read 2 more answers
A major problem with alcohol adverstising is that
Pavel [41]

Answer:

A chronic disease characterized by uncontrolled drinking and preoccupation with alcohol.

Alcoholism is the inability to control drinking due to both a physical and emotional dependence on alcohol.

Symptoms include a strong need or urge to use alcohol. Those with alcohol use disorder may have problems controlling their drinking, continue to use alcohol even when it causes problems, or have withdrawal symptoms when they rapidly decrease or stop drinking.

Treatment involves counseling, such as behavioral therapy, and medications that reduce the desire to drink. Some people need medical detoxification to stop drinking safely. Mutual support groups help people stop drinking, manage relapses and cope with necessary lifestyle changes.

Explanation:

8 0
3 years ago
Suppose Alice uses the RSA system with a very large modulus n for which the factorization cannot be found in a reasonable amount
Yuliya22 [10]

Answer:

Encryption method security:-

  • Encryption method representing each alphabetic character as an integer between 0 and 25.
  • Now, apply RSA algorithm for each integer is not an efficient secure encryption method.

Explanation:

  • Let consider alphabetic characters set {A, B... Z} .
  • Each alphabetic character forms a set of message block values M={0,1,2...,25).
  • From encryption method the corresponding cipher text block value C = {0e mod n,1e mod n, 2e mod n,..., 25e mod n}.
  • Then, compute the cipher text with knowledge of Bob's public key;
  • If the public key is generated, then possibility to decrypt the cipher text to plain text.
  • The generated public key is easily calculated by everyone and security is lost.
  • Therefore, the encryption method is not secure.

Encryption method is not secure, Most efficient attack against this method:-

  • Now, compute the encryption message with the function Me mod n for all the possible values of M.
  • This is the most efficient attack against the scheme in encryption method.
  • Then, create a look-up table with cipher text as an index to the corresponding plain text as a value for appropriate location in the table.
4 0
3 years ago
Other questions:
  • 16. The data selected to create a chart must include
    6·1 answer
  • Which of the following is not an acceptable way to code a nested structure? Select one: a. nest a for loop inside a while loop b
    15·1 answer
  • What is plagiarism?<br> EXPLAIN IT
    15·2 answers
  • To run a PHP application that has been deployed on your own computer you can enter a URL in the address bar of your browser that
    7·1 answer
  • ____________ is a widely accepted international best practices framework for implementing information systems security.
    12·1 answer
  • One of the greatest benefits of dual enrollment courses is that students can receive:
    15·2 answers
  • I need someone's opinion<br> Which format is better? The first or second one? I can't decide 0.0
    15·2 answers
  • You wrote a program to allow to guess a number chosen randomly.
    10·2 answers
  • What are possible consequences for cyberbullying?
    13·2 answers
  • Which statement about the Weather Bar in the Outlook calendar is true?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!