a ____________ is the intersection of a column and row in an excel spreadsheet.

Answers

Answer 1

Answer:

a cell is the intersection of a column and row in an excel spreadsheet.


Related Questions

Which of the following is a type of equation which returns a value such as TRUE or
FALSE?

A. Argument
B. Expression
C. Nest
D. Control

Answers

Answer:

C

Explanation:

True HOPE THIS HELPS BOY/GURL AH

The type of equation which returns a value such as TRUE or FALSE is logical.

Which formula gives the logical value in the form of true or false?

A logical value is known to be The TRUE and FALSE functions

An example is if you type “=TRUE()” into a cell, it is said to often return the value TRUE and when you type “=FALSE()” it will also return as FALSE.

Learn more about equation  from

https://brainly.com/question/2972832

Which Amazon device can be used to control smart devices (such as lights) throughout a home using voice commands

Answers

Answer:

Alexa device

Explanation:

You can build smart home and other products that customers from millions of Alexa devices with just their voice .

which one of the following is not a barrier to effective communication?
A physical barrier
B linguistic barriers
C interpersonal barriers
D subjective barrier​

Answers

answer correct:B. ,,,,,,,,,,,,,,,,,,,

The option that is not a barrier to effective communication is D. subjective barrier.

It should be noted that barriers to communication simply means the impediments that can affect effective communication.

Some of the barriers to communication include physical barrier, linguistic barriers, and interpersonal barriers. It should be noted that a subjective barrier isn't a barrier.

Read related link on:

https://brainly.com/question/25718682

A data dictionary is also known as ________. Group of answer choices a data warehouse clickstream data a data mart ubiquitous computing a metadata repository

Answers

Answer:

A data dictionary is also known as metadata repository.

Define cyber law with its area ​

Answers

Answer:

Cyberlaw is the area of law that deals with the Internet's relationship to technological and electronic elements

Different areas of cyber law are: Computer Crime, Cyberstalking, Intellectual Property, Searching and Seizing Computers and Data Protection adn Privacy.

During the maintenance phase of the systems development life cycle (SDLC), hardware and software components have been _____.

Answers

Answer:

developed and tested.

Explanation:

prepare a short report of some technological devices??
please help me brainliest​

Answers

Answer:

Technology is the most useful form of science for the general population. In simple words, technology is when we take the concepts of science and transform them into gadgets and devices that are useful to us as human beings. When we look around us, almost everything is a result of or a form of technology.

For example, the device you are using right now is a form of technology made for communication, or the refrigerator in your kitchen is a use of science that helps to keep your food fresh and cool. With these examples, we see how dependent we are on technology and how important it is for us in our daily lives.

It isn’t easy to imagine our lives without using any form of technology. For the smallest of communications, we tend to turn to our mobile phones. Even most of the food we eat is packaged in factories using various technologies. Thus, imagining a life without technology is impossible. It is not only a fact of life but also a necessity for all of us.

In fact, the smartphone, that is, a mobile phone which can connect to the internet, is becoming one of the fastest-growing and most accessible forms of technology around the world. On a smartphone, you can click photographs, browse the internet, listen to music, and use social media. With the advent of smartphone technology, the practical purpose of not only communicating with your friends is met, but also so many others, as mentioned.

Thus, in today’s world, the importance of technology becomes more and more as the years pass. Scientists have done so much to advance humans using technology, and we still have a long way to go.

Explanation:

You are welcome! ;D

Suppression of politically or socially unacceptable co
O backlinks
O compress
O forum
O censorship

Answers

Answer:

censorship

Explanation:

censorship means to block out something that is against the rules, to silence some sort of message/comments. so the answer is censorship

Debug big tower can someone help me

Answers

Answer:

2

Explanation:

2 is because that what i think

Answer:its c

Explanation:

because thts wht i thinl

When you declare a method, you also need to provide the method ______________, which consists of statements that are executed when the method is called.

Answers

When you declare a method, you also need to provide the method body, which consists of statements that are executed when the method is called.

Hope this helps!

Choose a video game that you enjoy playing and discuss its game mechanics. Can you identify any game mechanics that your game has that were not mentioned in the unit?

Answers

Answer:

Fresh out of college, Barry the Bee (Jerry Seinfeld) finds the prospect of working with honey uninspiring. He flies outside the hive for the first time and talks to a human (Renée Zellweger), breaking a cardinal rule of his species. Barry learns that humans have been stealing and eating honey for centuries, and he realizes that his true calling is to obtain justice for his kind by suing humanity for theft.

Explanation:

meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow em

b. A customer is transferring $2500 from one account to another on Thursday, 4 January 2018. After clicking the next button, an error message is shown.
i.State ONE factor that could have led to an error caused by the customer.

ii.TWO factors that could have led to an error caused by the technology

answers please ​

Answers

Answer:

b

Explanation:

I am a device which is used to scan characters printed in magnetic ink​

Answers

Answer:

scanner is right answer or

A __________ is a thorough examination of each aspect of a network to determine how it may be compromised.

Answers

Answer:

A posture assessment. :3

True or False: At the Company level, users will only have access to view projects to which they have been specifically granted access to by a company/project administrator.

Answers

Answer:

True

Just look it up and put quizlet at the end of your question youll find it.

Why is RAM considered as a volatile memory?​

Answers

RAM (Random Access Memory) is called volatile memory, because in RAM memory gets erased on turning off the power.......

What is the output of the statements below? int a = 10; int b = 20; int count = 0; if (a > 5) if (b > 5) { count ++; } else count = 7;

Answers

Answer:

The output of count would be 1.

Explanation:

The first if statement is true. Since 10 > 5

The second if statement is true. Since 20 > 5

So,

count ++;  // That increments the variable count by 1

the else statement is not provoked since the if statements were correct.

Please fill in I give 50 points!!

# Heading (name, date, and short description) feel free to use multiple lines

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

* explains the whole paragraph what ever that is * there

What are some positive and negative impacts of computer science changing how we work, where we work and when we work?​

Answers

Answer:

Using those tools, computer science allows us to predict hurricanes, tornadoes, or even the outbreak of a potentially fatal disease. It can even be used to predict human behavior, which can help prevent crimes. Computer science can provide us with some life-saving tools and work.

Explanation:

In disc brakes, pads are forced against the of a brake disc​

Answers

Answer:

Explanation:

It's the surface the brake pads contact. When you step on the brakes, pressurized brake fluid pushes against the pistons inside the caliper, forcing the brake pads against the rotor. As the brake pads press against both sides of the disc, the friction stops the wheel's rotation.

WILL MARK A BRAINLIEST!!! PLS HELP!!!




Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

We've known each other for so long

Your heart's been aching but you're too shy to say it

Inside we both know what's been going on

We know the game and we're gonna play it

And if you ask me how I'm feeling

Don't tell me you're too blind to see

A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. (1pts) Question 34 - A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. systems analyst chief information security officer chief security officer network administrator server administrator

Answers

Answer:

1. CSO (Chief Security Officer)

2. Network Admin

Explanation:

Hope this helps!!! :))

The first step of the Data Encryption Standard (DES) involves breaking the plaintext into blocks of ______.

Answers

Answer:

64 bits

Explanation:

DES uses block encryption

Shad has been finding himself unable to focus lately. Sometimes, he feels a knot in his stomach accompanied by nausea. As a result, he rarely has an appetite and is eating less than he should. These symptoms coincided with Shad being selected for the lead role in the school play, which now adds a new responsibility to an already challenging academic schedule and part-time job. What might be an effective strategy for Shad to manage this stress? Add daily workouts to his schedule, at least 20 minutes each, to increase his energy and reboot his focus on his own health. Assess the amount of time needed to fulfill all his responsibilities and create a schedule to prioritize and organize commitments. Change his options for meals and select more appealing "comfort" foods that will make him enjoy eating again and increase his appetite. Quit the school play so that he can return to a schedule that is more manageable and will cause him less stress and anxiety.

Answers

Answer: change the food he eats to a comfort food so that he eats more

Answer:

The answer to this question is **Assess the amount of time needed to fulfill all his responsibilities and create a schedule to prioritize and organize commitments.

Explanation:

This answer makes sense because Shad wanted the the lead role, so he just needs to organize his other responsibilities and create a schedule that works without being stressed. Time management.

which file access access flag do you use to open a file when you want all output written to the end of file's contents

Answers

Answer:

ios::app

Explanation:

We want to simulate constantly flipping a coin until we get 3 heads in a row. What kind of loop should we use

Answers

There are different types of loops that are used in computer programming. The kind of of loop that is suitable is the

while loop.

In computer programming languages, a while loop is simply known to be a control flow statement that gives code to be executed everytime based on a given Boolean condition.

The while loop can simply be said to be a repeating if statement.

It used to repeat a particular block of code in any number of times, until a said point or condition is met.

When used in C programming, it often in repeated manner executes a target statement.

Learn more from

https://brainly.com/question/21298406

"Depression is being colorblind and constantly told how colorful the world is.”

Answers

Depression is when they tell you how good it is to walk but you can’t walk

What is the most likely reason for protecting a worksheet?

to track all changes made by editors to a worksheet
to stamp the worksheet with an individual’s information
to prevent email programs from sending the worksheet
to prevent unauthorized users from modifying the worksheet

Answers

Answer: D, to prevent unauthorized users from modifying the worksheet.

Explanation:

Answer:

D. to prevent unauthorized users from modifying the worksheet

Explanation:

hope this helps :)

Element of Ghanaian Culture that bind the people together​

Answers

[tex]⟹[/tex]

For example, social values, religion, morals, political values, economics and aesthetic values all contribute to African Culture. Expressions of culture are abundant within Africa, with large amounts of cultural diversity being found not only across different countries but also within single countries.

Ghanaians are able to express their culture through marriage, dressing, music, festivals, religion, occupation etc. Here, the "enstoolment" and "enskinment" processes of the various ethnic groups differ.

Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

What are the Basic elements of culture in Ghana?

The major elements of culture are said to be:

SymbolsLanguage etc.

Note that Language is one effective social interaction that binds Ghanaians together.

Therefore,Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

Learn more about culture from

https://brainly.com/question/25010777

#SPJ6

A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the host reboots or the us

Answers

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of compromise include log-in red flags, unusual outbound network traffic.

Read related link on:

https://brainly.com/question/25522987

Other Questions
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!8 . Check the given measurements whether it could make a triangle (a) 7 cm, 2 cm and 5 cm (b) 10 cm, 12 cm and 14 cm. Find the midpoint of the followingtwo coordinates:(3, 1) and (5,5)Hint: x1 + x2 Y1 + y22.92.A. (3, 4)B. (2, 4)C. (4,3) Complete the equation to show how many tenths are equivalent to 1/2 what did you feel when you were doing family genogram? opinion NO LINKS!!!Complete the following problems to the best of your knowledge. Show all your work. Part 1 using iot to track packages, containers, and other bulkware are examples of what type of smart iot technologies? I need help asap please An increase in which property would cause an electromagnetic wave's energyto increase?A. WavelengthB. MassC. FrequencyD. SpeedSUBMIT 4. All of the following lines from "Alone" contain examples of alliteration except (1 point)"like a boy in a playground surrounded by enemies.""and scuttled smartly right over the road.Then - stillness. I sat back in my seat-belt.Face coated with clay. 1. A linear function can be represented by the equation y = 7x - 4. Identify the slope and y-intercept.y-intercept:Slope: ply answerWhich To Dos were on the Reconstruction Era List? (Select all that apply. 4 are correct) 2Select the correct answer.Which statement describes the concept of number sense?OA.an ability to solve numerical equations.an ability to add, subtract, multiply, and dividean ability to use formulas to calculate a solutionOC.ODan ability to understand numbers and their relationshipsResetNext find the value of x for which f(x)=4 (simplify) i will give brainliest if correct28 7 - 9 this activity, you will practice finding the side lengths and angle measures of various right triangles when given limited Information. Go to theght triangle solver e, and complete each step below. This activity will require careful planning of your calculations before you complete them.sure to think ahead..Generate a new problem for each of the problem types listed in the table. You'll be choosing the unknown (what you're solving for) and themethod to generate the problem. If the problem onscreen does not fit the required type, click the New Problem button until you get aproblem that does fit. The program will determine when you've properly constrained a problem and then give you a relevant equation. At this point, review theinformation that you're given for the triangle and enter it in the appropriate column. Then enter the correct values into the equationonscreen by clicking on the correct parts of the triangle. Finally, determine your result. Solve for the unknown and enter your solution in the input window provided onscreen. Then paste ascreenshot of your solution in the table. Every triangle in this section is a right triangle, so you can assume that one of the angles of each triangle equals 90 as part of your giveninformation write any two areas where there is acute need of inclusion in nepal? Planes S and R both intersect plane T .Horizontal plane T intersects vertical planes S and R. Planes T and S intersect at line x. Planes T and R intersect and line y. Horizontal line v intersects line x at point B and line y at point A. Line z intersects the lower half of plane S at point C. Point D is on line z but not on a plane.Which statements are true based on the diagram? Select three options.Plane S contains points B and E.The line containing points A and B lies entirely in plane T.Line v intersects lines x and y at the same point.Line z intersects plane S at point C.Planes R and T intersect at line y how do you respect other rights while using your right Firms produce the goods and services used by households. That includes everything from packaged food to video games to dry cleaning. Households provide the factors for production that firms require. These factors include the workers who make, distribute, and sell goods and services. Factors of production also include the revenue that firms earn from consumer expenditures. That money comes from the income paid by firms, primarily in the form of wages. This flow of funds from firms to households back to firms creates an exchange that benefits both firms and households. When an economy is strong, jobs are created and livable wages are paid. This allows workers to spend more money, and the cycle continues.The Circular Flow of IncomeHow does consumer spending stimulate economic growth?Consumer spending pays funds directly into households.Consumer spending increases withdrawals from an economy.Consumer spending allows firms to flourish and new businesses to develop.Consumer spending prevents a factor that can be an obstacle to production.