1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ber [7]
2 years ago
7

8. The cell reference for a range of cells that starts in cell A1 and goes over to column G and down to row 10 is, a. A1-G10 b.

A1.G10 C. A1;610 d. A1:G10​

Computers and Technology
1 answer:
RoseWind [281]2 years ago
3 0

Answer:

The correct answer is d. A1:G10

You might be interested in
From the PC or Laptop, open a web browser and navigate to cisco. Srv. Open the link titled A small page. What is the message dis
vladimir2022 [97]

The message displayed on the page is "Hello, world". Check more about messages below.

<h3>What is computer message?</h3>

In computer science, a message is regarded as a data that is in bit size which is often transmitted from sender, to its recipient.

Conclusively, Note that when you press from the PC or Laptop, and then open a web browser and navigate to cisco. Srv. by Opening the link titled A small page, the message that would be shown on the page  is "Hello, world".

Learn more about web browser from

brainly.com/question/15243054

#SPJ1

6 0
2 years ago
Please explain what steps you will take to prevent hackers from getting access to your personal information.
yuradex [85]
The steps I would take are 1. Making a strong password with symbols and numbers. 2. I will set up a 2 way authentication ther for if someone would be trying to hack me I would get an alert in order to stop the attempt. 3 I will not use the same password each time.
4 0
3 years ago
State three differences between a hard drive and a pen drive​
ExtremeBDS [4]

Answer:

A hard drive is what on your computer stores the operating system and all of the files you download. A pen drive (USB DRIVE) is a portable drive used for storing files that you can plug into computers with usb drive ports and transfer that data over to the computer through the USB Drive and you can also copy data onto the USB Drive from a computer and transfer it to other computers.

Explanation:

Computer Technician

7 0
3 years ago
Which best explains a password attached to a document?
Otrada [13]
That is encryption. Encrypted files usually have a password assigned. In order to decrypt the file, you need to have the password.
3 0
3 years ago
HURRY PLEASE ITS A TEST
laiz [17]

<em>A.)</em>

<em>It's either A or D both of them stand out and make sense to me so I think that it'll be right if you choose A or D.</em>

<em>-Ɽ3₮Ɽ0 Ⱬ3Ɽ0</em>

8 0
3 years ago
Other questions:
  • You have been asked to delete some data from medisoft but find that there is no delete button. what is another method you can us
    10·1 answer
  • ____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it ove
    15·1 answer
  • Brainstorming the pros and cons of upgrading versus replacing a set of ten desktop computers _________
    6·1 answer
  • Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It
    13·1 answer
  • What connectors are available for components to be connected externally to the motherboard
    12·2 answers
  • You want to use a terminal program to terminal into a cisco router. what protocol should i use
    8·1 answer
  • How to write cube of a number from flowchart ​
    5·1 answer
  • Algorithm to calculate the area of a square.​
    6·1 answer
  • When installing a Windows 10 an already installed Windows 7 what happen​
    11·2 answers
  • Find the total cost of a $125 coat purchased in Los Angeles County where the sales tax is 9%. Use the expression c + 0.09c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!