The format cells dialog box tab that provides options for locking or hiding cells to prevent other users from modifying their contents is _____.

Answers

Answer 1
The format cells dialog box tab that gives choices to locking or concealing cells to keep different clients from altering their substance is protection. It is part of Microsoft office application that enables to lock or protect the data. It is a way of protecting the files.

Related Questions

In microsoft windows when a window is minimized what happens to that window

Answers

it stays on what you are doing until you unminimize it to continue your work

The part of the poppet valve that contacts the valve seat is called the A. face. B. margin. C. head. D. stem.

Answers

It should be A face, I think

Answer:

A. Face

Explanation:

A poppet valve some time called mash room valve.The word poppet shares etymology with "puppet". In past "puppet valve" was synonym for poppet valve. however, this usage of "puppet" is now obsolete. The valve stem moves up and down inside the passage called guide, which is fitted in the engine-block. the head of the valve called valve face, is generally ground to a 45 degree angle. So as to fit properly on the valve seat in the block and prevent leakage.

When you save data on a disk, the os places it in an available storage area, or?

Answers

When you save data on a disk, the OS places it in an available storage area, or a "Sector".
Usually the computer places that data in sectors in an order and usually next to each other but that is not the case always, sometimes part/s of that data can be scattered at different places which actually slows down the computer, for which we need to Defragment the disk space.   

Which of the following options is used to view a computer's memory properties?

a) Accessories
b) Device Manger
c) Sytem and Hardward
d) Control Panel

Answers

It really depends on the computer's operating system but I'm pretty sure its either C or D
Cant choose well its c or d

What programming language transformed the software industry because beginning students could learn it easily?

Answers

C programming transformed the software industry.

Class 00 rubber gloves are used when working with voltages less than​ _____.

Answers

Answer: 500 volts AC, 750 volts DC
Class 00 rubber gloves are given the color "beige" based on the color code of rubber gloves.
The proof test voltage for this class of rubber gloves is 2500 volts of AC voltage and 10000 volts of DC voltage

Emilio has created a document in Word and needs to print labels. He is shopping at a store and finds Avery labels and another brand that is less expensive. What does Emilio need to do before buying the less expensive labels?

Answers

He needs to make sure that the less expensive label is compatible with Word. 
Final answer:

Emilio should check the less expensive labels for Word compatibility, ensure they fit his printing and application needs, and confirm that he can create or find a suitable template before purchasing.

Explanation:

Before Emilio purchases the less expensive labels, he needs to ensure that they are compatible with the Word document he created for printing labels. First, he should check the packaging of the labels to see if they provide a template or mention compatibility with Word. Many label manufacturers offer templates that can be downloaded and used within Word. If no information is provided, Emilio should look for the label size and compare it to the available templates in Word, or consider measuring the label dimensions and configuring a custom template if necessary.

Furthermore, Emilio should make sure that his printer can handle the label material and that the label adhesive is suitable for the surface to which they will be applied. If the less expensive labels provide all the necessary details for creating a Word template and are suitable for his printing and application needs, he can opt for the more affordable option without compromising his project.

A popular use of cd-rw and cd-r discs is to create audio cds. what is the process of copying audio and/or video data from a purchased disc and saving it on digital media called?

Answers

This process is called ripping. Ripping occurs when the audio or video content of a disc is extracted and copied onto any other digital media. This process does not damage the original disc or the data it contains. This process requires specific software to be successful.

To communicate with the operating system running on the computer, each device also requires a software element known as what?

Answers

To communicate with the operating system running on the computer, each device also requires a software element known as what? Answer: The device driver 

________ involves taking data from your database and putting it into an electronic file in a format that another external application or database can recognize.

Answers

The answer in the space provided is export. It is because in export, is has the ability to take the data in another file or application which is externally but could still be recognizable. It is a way of sending a file externally or placing them outside of the file that it came from. It could be seen above as it is similar of how it is being remove and placing it in another external application.

You want to use a terminal emulation program to terminal into a series of Cisco routers. You will be managing these devices remotely. What protocol should you use?

Answers

If a terminal emulation program is used and the devices should be reotely managed, then you should use the Telnet protocol. Telnet is a simple, text-based network protocol that is used for accessing remote computers over TCP/IP networks like the Internet. It allows the user access to a text terminal and all its applications such as command-line for example. 

Which two software interfaces allow adjustment of the cpu voltage? (choose two.)?

Answers

Below are the software interfaces allow adjustment of the CPU voltage:


UEFI Settings;
BIOS Settings

Unified Extensible Firmware Interface (UEFI) is a detail for a product program that associates a PC's firmware to its working framework (OS). UEFI is required to in the long run supplant BIOS. Like BIOS, UEFI is introduced at the season of assembling and is the principal program that runs when a PC is turned on. 
BIOS (basic input/output system) is the program a PC's microchip uses to kick the PC framework off after you turn it on. It likewise oversees information stream between the PC's working framework and joined gadgets, for example, the hard circle, video connector, console, mouse and printer.

Common types of possessed objects are smart cards, rfid-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.

Answers

Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, USB security tokens, and smartphones that are swiped through or placed close to a reader to be read. The USB security token is a physical security device used to gain access to an resource, that is electronically restricted.  The token provides secure storage for multiple login credentials.

Combination charts enable you to show three sets of data using the chart type that is best for each data set. _________________________. qizlet
a. True
b. False

Answers

The answer is true enjoy your night

When using color in computer-generated presentation aids, you should use?

Answers

When using color in computer-generated presentation, you should use the same background color on all visuals and no more than two colors for words. This is a principles of color and must be applied in computer-generated presentation aids like models,graphics( visual representations of information) and pictures (photographs and illustrations).

Which is NOT a type of SD card?
SD standard capacity
SD medium capacity
SD high capacity
SD input/output

Answers

I'm pretty sure the answer is B.

SD SC can held up to 2GB capacity

SDHC can held up to 32 GB

SDXC (eXtended) can held up to 2TB

SDIO is an interface for I/O devices, there are cameras with this standard.

Answer:

Your correct answer is B SD medium capacity

Explanation:

Suppose you wanted to run a web server or ftp server from your home. what type of ip address would you want?​

Answers

you would need to have a static ip address.

The __________ determines whether coolant should be pumped back into the engine directly or cooled first.

Answers

The THERMOSTAT determine whether coolant should be pumped back into the engine directly or cooled first. The flow of coolant in vehicles is controlled by the thermostat which allow the engine to increase in temperature up to the acceptable level, the thermostat then has to decide whether to send the coolant back into the engine or to have it cooled first.  

A battery becomes undercharged in a vehicle that is driven regularly. the charge indicator light remains off with the engine running. the cause of this problem could be

Answers

If the  battery is not charging it indicates that the generator is not working properly. It may be simply that the V-belt which goes from the crankshaft to the generator is too loose, or the generator may be faulty and may need to be replaced.

In which osi model layer(s) do nics operate?

Answers

NIC's operate on the Physical = Layer 1

Which of the following is a great collection of resources for those entering the workforce or embarking on a new career? A. TED Talks B. Ontario Public TV C. LearnThat D. 21st Century Framework

Answers

Its definitely C. Learn That

Answer:

The correct option of the following question is C.) LearnThat

Explanation:

LearnThat is the American Foundation which is the American 5013 non-profitable organization that manages and develops the online spelling and vocabulary program along with the free multimedia dictionary for learners, an Open Dictionary of the English. Foundation was established in the February 2004 under name eSpindle Learning.

A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. science forums

Answers

With the use of a database application people can store and retrieve large quantities of data almost instantaneously. Database applications can also be used to present the information in easy to read and understand forms. Database applications serve as an intermediary between the raw data and a user, making it easier to sort and use the data.

You want to enable nap so that all portal computers using wireless connections have an active firewall. which type of enforcement policy should you implement?

Answers

If you want  to enable NAP so that all portal computers using wireless connections have an active firewall, then the type of enforcement policy that should be implemented would be the 802.1x enforcement. It can be used to be able to restrict network access when a certain computer is regarded as a noncompliant to requirements.

What is the best method for collecting information from a source?

A. Provide citation info

B. Summarize or paraphrase important info

Answers

The best method for collecting information involves summarizing, paraphrasing, or directly quoting the source material, always with proper citations to avoid plagiarism and maintain credibility.

The best method for collecting information from a source is multifaceted and depends on your research objective. When considering the notes from your sources, you have the choice to summarize, paraphrase, or directly quote the information. Summarizing involves conveying the general idea of a text in a shorter form, without detailed specifics. Paraphrasing is close in length to the original text but rephrased in your own words. Direct quoting maintains the exact wording from the source and is placed inside quotation marks. Regardless of the choice made, proper in-text citation is crucial in order to credit the original author and avoid plagiarism. This practice preserves the integrity of your work and provides a pathway for readers to verify your sources.

When collecting information, it's essential to keep meticulous notes, ensuring that you clearly distinguish between your ideas and those borrowed from sources. Effective note-taking allows you to refer back to the original texts which aids in accurate quoting and paraphrasing. Moreover, the organization of source material and notes will assist in accurately citing your information sources, thus upholding your professional credibility.

The _________ design feature enables vehicles to enter or leave the main highway, while flowing with the traffic.

Answers

The FORK design feature enables vehicles to enter or leave the main highway, while flowing with the traffic.

A software component that has ____ mode access has total access to all of the computerâs data and its hardware.

Answers

The kernel has access to all data and hardware.

If a magnetic disc has 100 cylinders, each containing 10 tracks of 10 sectors and each sector can contain 128 bytes, what is the maximum capacity of the disk in bytes

Answers

Answer:

The maximum capacity of disc is 12,80,000 bytes.

Step-by-step explaination:

Given a magnetic disc having 100 cylinders & each containing 10 tracks of 10 sectors. Hence, total no. of sectors in magnetic disc are [tex]100\times 10\times 10[/tex]=10000 sectors

Each sector contain 128 bytes.

we have to find the maximum capacity which can be calculated as

Maximum capacity = No. of sectors[tex]\times[/tex]capacity of sectors

                               =  10000[tex]\times[/tex]128

                              = 12,80,000 bytes

The maximum capacity of the disk is 1280000 bytes.

Further Explanation:

It is given that a magnetic disc having 100 cylinders and each cylinder containing 10 tracks of 10 sectors.

Therefore, the number of sectors in the magnetic disc is the product of total cylinders, tracks and sectors.

The number of sectors is calculated as,

[tex]\begin{aligned}\text{Total sectors}&=100\times 10\times 10\\&=10000\end{aligned}[/tex]

The maximum capacity of the magnetic disc is the product of number of sectors in magnetic disc and capacity of a sector.

[tex]\begin{aligned}\text{maximum capacity}&=10000\times 128\\&=1280000\end{aligned}[/tex]

Thus, the maximum capacity of the magnetic disc with 10000 sectors and capacity of 128 bytes is 1280000 bytes.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623

Answer details:

Grade: College Engineering

Subject: Computer Science and Technology

Chapter: Computer hardware

Keyword:

Capacity, maximum, hardware, magnetic, disc, sector, bus, bytes, bits, product, cylinder, track, compact disc, hard drive, floppy, optical disc, architecture, computer,  floppy disk, magnetic tape, MB, KB, disk

Choose the correct html element to define important text

Answers

The HTML element to describe significant text is the <strong>. An HTML element is an distinct constituent of an HTML document or web page when this has been analyzed into the document object typical. HTML is composed of a tree of HTML nodes such as text nodes. Each node can have HTML attributes specified. Nodes can also have content including other nodes and text. Many HTML nodes represent semantics or meaning. For example, the title node indicates the name of the file and an HTML element is distinct by an primary tag. If the element comprises other gratified it ends with a terminating tag where the element term is headed by a onward slash.

The HTML element to describe significant text is the <strong>.

How it this so?

When investigated into the document object, an HTML element is a discrete part of an HTML document or web page. HTML is made up of a tree of HTML nodes like text nodes.

HTML properties can be supplied for each node. Nodes can also include content such as other nodes and text. Many HTML nodes are used to represent semantics or meaning.

For example, the title node specifies the file's name, while an HTML element is distinguished by a main tag. If the element contains additional gratified, it ends with a terminating tag that is preceded by a forward slash.

Learn more about HTML element at:

https://brainly.com/question/11569274

#SPJ6

Image files are grouped into two categories: _____.

Answers

Final answer:

Image files can be broadly classified into two categories: raster graphics and vector graphics. Raster graphics are pixel-based and include formats like JPEG, GIF, and BMP, whereas vector graphics use mathematical formulas to represent images, allowing them to be scaled without losing quality, with SVG being a common format.

Explanation:

Image files are grouped into two categories: raster graphics and vector graphics. Raster graphics, such as JPEG, GIF, and BMP, store images as a collection of pixels, with each pixel representing a single color. The quality of these images is dependent on their resolution, with higher pixel densities resulting in sharper images. Examples of raster graphics include digital photos which are often seen in JPEG format. On the other hand, vector graphics, such as SVG, define images using mathematical formulas that represent shapes and lines. This allows vector images to be scaled up or down in size without losing quality, making them ideal for logos and other designs that need to be resized frequently. Common examples of vector file formats include SVG (Scalable Vector Graphics).

Understanding the differences between these two categories is essential for working efficiently with digital images, each having their unique advantages depending on the application.

Your school computer library has a network that connects computers and devices within a few small rooms. what type of network does it likely use?

Answers

a routed and secured network which can send internet access to all computers 

Other Questions
Which rf characteristic best determines the range of a 2.4 ghz ism signal? If a proton is released at the equator and falls toward earth under the influence of gravity, the magnetic force on the proton will be toward the ____ assuming the magnetic field is directed toward the north at this location. In a transaction-processing system (tps), if the tps database can be queried and updated while the transaction is taking place, this is called ________ processing. Through single-cell recordings, researchers have identified the ________ neurons in the visual system. Gabrielle's age is two times Mikhail's age. The sum of their ages is 72 . What is Mikhail's age? Women in the 1920s who rebelled against conventional dress, hairstyles, and what was considered to be ladylike were commonly called "When in the Course of human events, it becomes necessary for one people to dissolve the political bands which have connected them with another, and to assume among the powers of the earth, the separate and equal station to which the Laws of Nature and of Nature's God entitle them, a decent respect to the opinions of mankind requires that they should declare the causes which impel them to the separation."These lines from the Declaration of Independence are an example of the use of thesis, theme purpose pathos Researchers sample 4 comma 0004,000 households concerning tv shows they watch. based on the sample 1616% reported watching 60 minutes. what is the 95% confidence interval for the proportion of all americans that watch 60 minutes? Which of the following words has anegativeconnotation?ExcursionsLonelyFreedomMosses Match the perfect square trinomials with their factors 4a2 + 4a + 1 (2 + a)(2 + a) 4a2 4a + 1 (2a + 1)(2a + 1) 4 4a + a2 (2a 1)(2a 1) 4 4a a2 (2 a)(2 a) 4 + 4a + a2 Which theory holds that some people have a genetic disposition toward fat storage and retaining weight? A t-shirt manufacturer designs shirts showing caricatures of certain generic rich athletes. these are not literal depictions but rather exaggerated images of these athletes. what would be the most likely result Andrew wants to participate in downhill mountain bike racing, but he will need to buy some new equipment. As he shops, he assesses the risk of racing and thinks about strategies to lower those risks. Which of the following is a risk assessment and NOT a strategy?1. Andrew weighs the pros and cons of different braking systems.2. Andrew considers the likelihood of crashing while riding.3. Andrew asks about the kinds of safety equipment available.4. Andrew inquires whether full-face helmets can offer extra protection. Mayan company had net income of $33,250. the weighted-average common shares outstanding were 9,500. the company sold 4,500 shares before the end of the year. there were no other stock transactions. the company's earnings per share is: Family relationships in ancient China were strongly influenced by What is the value of the expression All of 4.8 multiplied by 10 to the power 9 over all of 1.6 multiplied by 10 to the power 3 What major achievement for African Americans took place after world war 2 What was the reaction to Gorbechev's changes? Everyone thought the new political system was ideal. The United States thought the changes he was making were dangerous. A large group of Communists attempted to take control of the Soviet Union because they disliked his ideas. Most of the world disliked his changes from Communism. What number of atoms of phosphorus are present in 1.00g of each of the compounds in exercise 48? How can you best help people with eating disorder Steam Workshop Downloader