1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkinab [10]
3 years ago
8

To break a text string into several lines, which means that the text string continues on the next line, the _____ character shou

ld be used.
Computers and Technology
1 answer:
Montano1993 [528]3 years ago
4 0

Answer:

To break a text string into several lines, which means that the text string continues on the next line, the backslash character should be used.

You might be interested in
Why might you complete a 1040 instead of a <br> 1040ez
julia-pushkina [17]
Because compared to 1040EZ, 1040 way more more complex.


3 0
3 years ago
Read 2 more answers
Drag each label to the correct location on the image.
andrezito [222]

Answer:

1.) Relative cell reference - A1

2.) Absolute cell reference - $D$2

3.) Mixed cel reference - $D2

Explanation:

In Microsoft Excel, cell references are very important and critical when dealing with formula. They can give you what you’re looking for or make your entire worksheet incorrect.

A cell reference is a cell address or a range of cell addresses that can be used in a formula.

There are three types of cell references and they are;

a) Relative reference

b) Absolute reference

c) Mixed reference

A relative cell reference is a cell reference that changes when you copy the formula to other cells. It s usually just a normal cell reference like A1, B2, C3. If a formula with a relative cell reference is copied down to other cells, the formula will change. That is a formula with a relative cell reference changes with respect to the cell which it is copied to.

An absolute reference does not change when you copy the formula to other cells. In absolute references, the dollar sign $ is used to “lock” both the row and column so that it does not change when it is copied to other cells. An example is $D$2.

Using a mixed cell reference, one is trying to see that only either the row or column changes with respect to other cells when they are copied. It is like “locking” either the column or the row while changing the other. Just like from the example, $D2 is a mixed cell reference where only the column is locked such that only the row changes when the formula is copied to other cells.

7 0
3 years ago
An access control system that grants users only those rights necessary for them to perform their work is operating on which secu
solmaris [256]

Answer:

B. Least privilege                

Explanation:

  • The principle of least privilege an important principle in computer security.
  • It limits the access rights for users and only grant them with the rights that are sufficient for them to perform their required task.
  • For example a user is granted privilege to execute a file or manipulate data or use only the resources that are required for them to perform a particular task.
  • This principle can be used only to limit and control access rights to system resources and applications.
  • The least privilege is beneficial as it reduces the risk of unauthorized access.
  • For example a user whose task is data entry and has nothing to do with controlling access or granting access rights to users, will only be allowed to enter data to the DB by the principle of least privilege.
7 0
4 years ago
The vast amount of data collected from Internet searches, social media posts, customer transactions, military
Brums [2.3K]

Answer:

A. Big Data

Explanation:

It is big data. The internet searches, customer transactions, social media posts, medical tests, weather sensors, military surveillance, and all the data source you are seeing around yourself forms together with the big data. And a big social media company gathers around so many petabytes of data each day. And there are so many such companies, plus all sorts like eLearning sites, etc. And all these together form the big data.

3 0
4 years ago
What are possible penalties if a designer is caught breaking copyright laws?
Dominik [7]

Answer:

1 and 4 are the correct answers.

Explanation:

3 0
3 years ago
Other questions:
  • Solar power plants trap the sun’s energy and convert it into electricity. What is a problem associated with this technology?
    11·1 answer
  • The program processes the command line arguments. The arguments indicate which signals to catch:________. A. The program emits a
    10·1 answer
  • Over the past few years a very definite need has arisen in the electrical trades for:
    15·1 answer
  • As a computer science student, which career you will select and what do you predict about the future of that specific IT-Career.
    8·1 answer
  • Please help! Answer this question if you know computer science very well. I need help with computer science.
    13·1 answer
  • You are comparing cryptographic solutions to implement at your organization. Which two items should you focus on when you are ev
    12·1 answer
  • Add me on blizzard none of my friends play ow<br> NADERJABER#2530
    8·1 answer
  • What is pollution?
    14·2 answers
  • What type of dns record holds the dnssec public signing key?
    9·1 answer
  • A web-based program that uses artificial intelligence techniques to automate tasks such as searches is called
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!