Answer:
Following are the solution to this question:
Explanation:
Some of the data is missing in the question, which is defined in the attached file. Please find it.
Follows are the formula which is used in the question:
- EmployeeAnalysis Worksheet IF(C5>49,"Certified","Not Certified")
- Transactions Worksheet IF(F10="No","",0.07)
In the first condition, it checks "C5" is greater than 49 if the condition is true, it will give "Certified" otherwise, it will give "Not Certified".
In the second condition, it checks "F10" is equal to "No" if the condition is true, it will give a blank or space otherwise, it will give "0.07".
Answer:
c. nbtstat -a 193.145.85.202
Explanation:
Nbtstat is a TCP/IP utility which is used to display the current connections and statistics of TCP/IP using NetBIOS over TCP/IP (NetBT).
It is installed on a computer running Microsoft Windows when the TCP/IP protocol stack is installed.
Also, it is very useful when we want to troubleshoot NetBIOS name resolution problems.
One can run nbtstat -a < ComputerName > to obtain the local NetBIOS name table on <ComputerName> and its MAC address
Answer
File names should describe the content of the file.
Explanation
File names are set of words which are used to uniquely identify computer files which are stored in a file system. This helps one to know the contents of the file which you want to find. When you name these file names you use necessary characters you use descriptive words so that you dont have hard times when searching for them. The naming also is determined by the file system you are using because different systems impose different restrictions on the length of the file names and the allowed characters within file names.
Answer:
the answer is priming read
Explanation:
hope it helps u
Answer:
Incomplete Question.
I'll answer this question based on general terms
Explanation:
Two Factor Authentication, abbreviated as 2FA.
It is a type of authentication that requires the presentation of two credentials for access to personal data and information.
The credentials needed for a 2FA are
1. Either of the following; PIN, Password or Pattern
2. Your device or gadget which could be an ATM Card, Mobile Phone
3. Biometrics such as fingerprint, voice input
Number one is often referred to as "Something you know"
Number two is referred to as "Something you have"
Number three is referred to as "Something you are"
The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.