1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
2 years ago
9

Question 1(Multiple Choice Worth 5 points)

Computers and Technology
2 answers:
LUCKY_DIMON [66]2 years ago
7 0
B is the answer lol yeah I had that some answer
aleksley [76]2 years ago
3 0

Answer:

b

Explanation:

it's not a c or d and now I have to make it 20 characters long so I will do this

You might be interested in
1. Insert a Header that has the following in excel​
Fofino [41]

Answer:

Go to Insert and click on Text and underneth that click header and footor.

Explanation:

You can do a Header and Fotter in Excel. ALl you have to do if go in the document you are working in and you click on Instert tab and then click on Header and Fotter. It gives you an option to make a header for your excel wookbook.

7 0
3 years ago
Hexadecimal to denary gcse method
Anuta_ua [19.1K]

There are two ways to convert from hexadecimal to denary gcse method. They are:

  • Conversion from hex to denary via binary.
  • The use of base 16 place-value columns.

<h3>How is the conversion done?</h3>

In Conversion from hex to denary via binary:

One has to Separate the hex digits to be able to know or find its equivalent in binary, and then the person will then put them back together.

Example - Find out the denary value of hex value 2D.

It will be:

2 = 0010

D = 1101

Put them them together and then you will have:

00101101

Which is known to be:

0 *128 + 0 * 64 + 1 *32 + 0 * 16 + 1 *8 + 1 *4 + 0 *2 + 1 *1

= 45 in denary form.

Learn more about hexadecimal from

brainly.com/question/11109762

#SPJ1

3 0
2 years ago
Most _____ focus on galning entry over the internet to a secure computer system by finding a
dangina [55]

Most <u>Malware</u>  focus on gaining entry over the internet to a secure computer system by finding a  working user ID and password combination.

<u>Explanation:</u>

A malware is a small computer program which works on the user’s system without knowing to the user. Different malware works differently.

Some malware sits on the user computer, create multiple unnecessary files and make the hard drive full, some people create viruses to show their computer skills which they tend to prove in a wrong way, some malware sits in the computer to steal data especially while using internet.

So there are malware's like Virus, Worm, Trojan, spyware, etc.

5 0
3 years ago
If you used D*n as the criterion in a Short Text field called FirstName, what would appear in that field in the query results
Soloha48 [4]

When querying a list or table, the use of wildcard symbols maybe used to optimize the search result. The words D*n will return First names which <em>starts with D and ends with n.</em>

  • The (*) denotes that the search returns any values or alphabets inbetween D and n.

  • Names such as <em>Dean, Don, Drezn</em> and other rated names would be included in the returned query.

Therefore, the returned query would include names starting with the letter D and ends with the letter n.

Learn more : brainly.com/question/25586700

5 0
2 years ago
true or false? spreadsheets provide more options for graphical representation of the data than databases​
myrzilka [38]

Answer: True. Its true and it will be true.

8 0
3 years ago
Other questions:
  • Use the Internet and other sources to research the two disadvantages of standard biometrics: cost and error rates. Select one st
    10·1 answer
  • Which of the following is not a metamorphic agent?
    8·2 answers
  • Without entering into the internet cloud or intranet cloud, how many icons in the topology represent endpoint devices (only one
    6·1 answer
  • How do u use this app?
    15·2 answers
  • Retype and run, note incorrect behavior. Then fix errors in the code, which should print num_stars asterisks.
    9·1 answer
  • Using a third-party package of your choice, write a program that reads the contents of a csv file and saves it to an Excel file.
    10·1 answer
  • The use of a concept or product from one technology to solve a problem in an unrelated one
    11·1 answer
  • How do you enter the decimal 73 into the computer?
    11·1 answer
  • Polynomial regression A common misconception is that linear regression can only be used to fit a linear relationship. We can fit
    11·1 answer
  • What is a phone made out of dna
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!