1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
2 years ago
9

50 ) What is the cell address of 4th row and 4th column? A) 4D B) E4 оооо C) 04 D) B4​

Computers and Technology
1 answer:
blsea [12.9K]2 years ago
7 0

Answer:

The cell address of 4th row and 4th column is

4D/D4

You might be interested in
Questions: What memory modules are needed if the customer wants 3 GB of RAM? What capacities and how many modules of each capaci
zhannawk [14.2K]

Answer:

You could use three 1 GB modules.

4 0
2 years ago
If you’re looking for a quick, high-level overview of common metrics such as audience growth, website traffic, and total posts,
salantis [7]

Google Analytics, this is a common one but there are others that do the same thing.

7 0
2 years ago
A network administrator is implementing multifactor authentication for employees who travel and use company devices remotely by
devlian [24]

Answer:

A networking administrator is a multi-factor authentication for employees who use company devices by using a VPN. The level of authentication is 802.1X and OTP.

Explanation:

Network administration is the computer network and uses multiple computers. A company and organization uses multiple computers and need a network admin to connect with a different system. Network administrators depend upon the organization. Some duties of the network administration are split and clearly defined such as

Configure the network hardware, servers, and routers

Upgrade the computer networks

Troubleshooting network issues

Assigning the network models

Deploying the software

Managing the servers

Implementing the security and measure

Network administration requires technical competence and will benefit as a network administrator.

For the level of authentication 802.1, X and OTP are suitable for network administration.

5 0
3 years ago
Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity an
podryga [215]

Answer:

Payment Card Industry Data Standard(PCI DSS).

Explanation:

The online payment acceptance through credit cards is governed by the Payment Card Industry Data Standard (PCI DSS) and it also includes the provisions that shoulde be implemented by gwen's company before accepting any transaction through credit cards.

8 0
3 years ago
Computer industries and organizations also face issues related to health, safety, and environmental issues. In this task, you wi
Pavel [41]

Answer:

"(Answers may vary.)

Your essay should detail the issues related to health, safety, and the environment. It should include the following points:

personal health and safety

issues related to ergonomics

health issues when working with computers, such as eyestrain, muscle pain, and so on

safety issues such as power surges, electric shock, and so on

environmental issues such as pollution caused by electricity consumption

e-waste and technology-related waste

use of non-renewable resources in production

Then write about the ways in which these issues are handled. Cover these points:

implementation of ergonomic designs

safety precautions

health-conscious design

recycling of waste and non-wasteful usage of resources

energy-efficient design"

Explanation:

5 0
3 years ago
Other questions:
  • The technology (software) that automatically downloads website information to your computer is called ________.'
    15·1 answer
  • What is the most effect way to include space after each paragraph
    14·1 answer
  • T F The scope of a parameter is limited to the function which uses it.
    12·1 answer
  • Browsing the web is one of the most common activities performed by individuals who use computers.
    12·1 answer
  • Assume that name and age have been declared suitably for storing names (like "abdullah", "alexandra" and "zoe") and ages respect
    14·1 answer
  • A blank is a copy of one or more files that is made in case the original become lost or damaged
    7·1 answer
  • A provides legal protection for something an individual has created
    12·1 answer
  • Are to print or find<br> the sum<br> 5 numbers<br> of<br> using flow chart
    6·1 answer
  • Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router is una
    7·1 answer
  • A. Mohit has bought a new laptop. The laptop is not working as no software is installed in
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!