1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Genrish500 [490]
2 years ago
13

Your worksheet contains confidential information in column C; to prevent others who use your worksheet from seeing the data, you

can _____ column C.
Computers and Technology
1 answer:
emmainna [20.7K]2 years ago
5 0
To prevent others who use your worksheet from seeing the data you can hide column C
You might be interested in
La computadora es un medio de comunicacion moderno?
kolbaska11 [484]
Moderno = mordern, if It does than yes!
3 0
3 years ago
Which CIDR network has the smallest possible number of hosts? a. 123.0.0.0/8 b. 123.45.0.0/16 c. 123.45.67.0/24 d. All have the
Lina20 [59]

Answer:

CIDR is based on a variable-length subnet masking technique, which allows a new method of representation for IP addresses. Routing prefix is written with a suffix number of bits of the name, such as 123.0.0.0/8, as the CIDR network has the smallest possible amount of hosts.

Explanation:

CIDR ( Class Inter-Domain Routing ) It is a method that is allocating IP addresses and routing the IP. CIDR is introduced in 1933 and replace the architecture of network design on the internet. CIDR slows down the growth of the routing across the web and helps to slow the IP addresses such as IPv4 addresses.

CIDR consists of two groups of bits in the address. In the new age, the network prefix identifies the whole network. This is used as the basis of routing between IP networks and allocation policies.

IPv4 in-network prefix is 8-bit groups.

A typical IPv4 address is 192.168.0.5 the lowest value is 0, and the highest value is 255

In the given choices, 123.0.0.0 / 8 of the possible smallest number of hosts.

8 0
3 years ago
____ returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.
Gemiola [76]

Answer:

<u>vecCont.capacity()</u> returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.

Explanation:

Consider the provided information.

vecCont.capacity() is a function that returns the maximum number of elements(without reallocation) that can be inserted into the container.

<u>vecCont.capacity()</u> returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.

6 0
3 years ago
Write a q basic program to find the sum of all the even numbers from 1 to 50​
Artist 52 [7]

Answer:

CLS

M=2

SUM=0

DO WHILE M<=50

SUM=SUM+M

M=M+2

LOOP

PRINT " The sum of all even numbers between 1 and 50 is"; sum

5 0
3 years ago
You listened to a song on your computer. did you use hardware or software? explain.
scZoUnD [109]
Software, unless you planned on permanently downloading the Music Album or Song to your computer's Hard Drive. i.e, you would use whatever Music or Media player you have installed on your computer, and that simply counts as Software. 
4 0
3 years ago
Other questions:
  • Operating system software allows you to use your fingers, a mouse or other pointing device to select screen controls, such as bu
    5·2 answers
  • How to write "There are four parking spots on campus that may be used only by Nobel Prize winning faculty." this sentence correc
    12·1 answer
  • You work in a customer call center. Martin is on the phone asking about the difference between solid-state drives (SSDs), hybrid
    6·1 answer
  • Can u suggest me some Hindi movies that is on you-tube please suggest
    7·2 answers
  • This program has some errors in it that are needed to be checked import java.io.*;
    13·1 answer
  • Help!!!! ASAP TIMED TEST 50 points!!!!
    7·1 answer
  • What are the five types of alignment in Word?
    12·2 answers
  • Instructions:Select the correct answer from each drop-down menu. What type of font color should Kim select if she chooses a dark
    10·2 answers
  • The Spanning Tree Protocol operates at the Network layer of the OSI model.
    13·1 answer
  • 1. The letters that appear after the dot after a file name are called the:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!