1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
3 years ago
8

1. A cell is identified by its ........

Computers and Technology
1 answer:
earnstyle [38]3 years ago
5 0
Answers:
1- cell address ( i think)
You might be interested in
How is ict integrated into marketing<br>​
Aleks04 [339]

Answer: The utilize of great ICT moreover moves forward client administrations and client request. From database advancement, site plan to showcase investigate, interpretation program, coordinate mail showcasing and preparing, the application of ICT is basic for a financial victory. The web is one of the ways in which media companies / businesses publicize.

Explanation:

5 0
2 years ago
Select the correct answer. Hudson has to maintain confidential college data in a spreadsheet. He needs two team members to help
AlladinOne [14]

Answer:

B. Protection

Explanation:

It is the protection tab. We can protect a cell from being changed or altered by any other user of the excel sheet using the protection tab. We only need to select the cell, and right-click, Now choose the protection tab, which will be shown. And now select locked and click ok. This cell cannot then be changed by anyone else other than you. Hence, the correct option here is the protection tab.

4 0
3 years ago
All of the following are examples of extracurricular activities except:
mart [117]
A, because normally that would be a requirment
8 0
3 years ago
Read 2 more answers
There are many advantages and some disadvantages to using social media. Explain at least one of the advantages to
OverLord2011 [107]

Answer:  yes

Explanation:social media has the advantage of long distance communication and a disadvantage is cyber bullying and yes i thank if most people where nice long social media is good  

3 0
3 years ago
A troubleshooting strategy that removes components from a system in order to get back to a basic configuration is called module
Semmy [17]

Answer:

B. False.

Explanation:

Troubleshooting strategy is a technique used to discover the cause of defeat in a system. The technician must learn to improvise with these strategies to solve a system problems.

Module replacement is a type of troubleshooting strategy that replaces a component with unknown status with another component with good status to determine the cause of the problem.

Removing a component from a system to get back to its basic configuration helps to eliminate factors that may make a computer problem difficult to solve.

3 0
3 years ago
Other questions:
  • ​your business has a web server that has suddenly become unresponsive. when you study the server's logs there are a huge number
    9·2 answers
  • The definition of an "analog device" is that it is a type of _____.
    5·1 answer
  • You just brought a new hard drive for your computer. U plan to use this as a secondary hard drive to store all your uma files. O
    10·1 answer
  • What do you call a named collection of data stored on a disk?
    15·1 answer
  • fill down feature on a formula and you need to keep a cell reference the same which one will allow you to keep the same cell ref
    15·1 answer
  • Often used in connection with a business
    6·1 answer
  • Many businesses use robotic solutions. Which department of the food and beverage industry uses robotic solutions on a large scal
    10·2 answers
  • Choose the correct term to complete the sentence.
    15·2 answers
  • In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
    9·1 answer
  • Who is willam afton from five nights at freddy
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!