1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
12

((Excel)) please help, 100 points, and brain crown thingy, not only that, i will make several of these so you can get several hu

ndred points just for one question if you find them all, that being said... please help me...
just please..
Computers and Technology
1 answer:
cupoosta [38]3 years ago
4 0

Answer:

First you read the question and numbers, then you use the numbers in the correct way and you try reallllyyy hard, you will find your answer! Hope this helps! :D

You might be interested in
What is the digital revolution and how did it change society? What are the benefits of digital media?
Rama09 [41]

Hello!

Before Social Media , Many people liked the old classical way and they had there own way to communicate with people. With social media everything changed . Companies started to grow and real face to face communication was  shrinking slowly . Kids locked themselves in there rooms to text friends and play games instead of playing outside. But technology does have a good affect for example if it wasn't for technology i wouldn't be able to help you right now ! If it wasn't for social media Wendy's wouldn't be able to Roast people . And contact over the phone would be limited .

HOPE I HELPED HAVE A BLESSED DAY!!


7 0
3 years ago
A technically qualified individual who may configure firewalls and IDPSs, implement security software, diagnose and troubleshoot
sineoko [7]

Answer:

Security technician

Explanation:

Security technicians are responsible for fixing, planning, and implementing the IT and computer security system of organisations by making sure the safety and security of the data and information of the clients as well as the employees that make daily use of the systems

Security technicians administer security access to the clients and employees of the organization and are responsible for being up to date with the latest IT security technology developments.

7 0
3 years ago
What's the difference between kilobyte and kibibyte, and why was the IEC convention for computer international memories made???
Masja [62]

Answer:

The Kibibyte was developed to take place of the kilobytes in the computer science context where the Kilobyte stands for 1024 bytes. And the Kilobyte interpretation to mean 1024 bytes, conflicts the Standard definition of the prefix kilo or 1000. And the IEC convention for computer international memories was made to define the international standards for electrical, electronic and related technologies.

Explanation:

Please check the answer section.

8 0
3 years ago
Which of the following is not a technology that can be used to conserve resources?
amm1812
<span>Natural gas when extracted through human industry will utilise resources to construct the necessary plant and machinery and then result in the consumption of a resource. Therefore this is the technology that cannot be seen as conserving resources.</span>
6 0
3 years ago
Read 2 more answers
What was most monumental decision in making a trip to Oregon?
White raven [17]

Answer:

A. The amount of food to take on the journey

Explanation:

Hope you get it right!!

3 0
2 years ago
Read 2 more answers
Other questions:
  • Describe the Say It, Cover It, Resay It method.
    14·2 answers
  • In databases and database-related software, which choice is not a Boolean operator?
    7·2 answers
  • What do you call the process of translating statements written by a developer? What is the result of this process?
    6·1 answer
  • Application means to
    5·1 answer
  • The blank contains the computer's brain the central processing unit CPU
    8·1 answer
  • ____ the styles allows the designer to start from a known baseline, confident that no unwanted styles will creep in from any bro
    6·1 answer
  • How does a author develop a character in a story?
    14·2 answers
  • Your sister asks you if it is possible to get an office productivity suite for free. What do you tell her?
    13·1 answer
  • Explain steps in creating a main document for from letter. <br>​
    5·1 answer
  • Buying a home security system is an example of protecting your home against________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!