answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
2 years ago
4

12 points. Fiona is starting to utilize the protection capabilities of Excel 2016. For the Lock or Unlock Cells function to work

, which option should be enabled?
The Protect Workbook function needs to be enabled.

No functions need to be enabled other than the lock or unlock cells options.

The worksheet must be saved before the cells will become locked or unlocked.

The Protect Worksheet function needs to be enabled.
Computers and Technology
2 answers:
Elina [12.6K]2 years ago
7 0

Answer: D

Explanation:

I got it wrong the first time :(

Anna71 [15]2 years ago
5 0

Answer:

a

Explanation:

You might be interested in
15. It is the process of capturing data or translating information to recording format
Helen [10]

Answer:

A Documentation, hope this helps.

5 0
2 years ago
Fill in the blanks to make the print_prime_factors function print all the prime factors of a number prime factor is a number tha
fomenos

The answer & explanation for this question is given in the attachment below.

3 0
2 years ago
____ twisted pair is the least quality twisted pair wire that should be used in a data/voice application.
xxMikexx [17]

Answer:

Category 5 (Cat 5) twisted pair is the least quality twisted pair wire that should be used.

Explanation:

The reason is as follows:

  1. Category 1 twisted pair is not suitable for transmitting data but comes in handy for telephone communications. Hence, it should not be used in a data/voice application.
  2. Category 2 twisted pair is suitable for data transmission, however, it can only transmit at 4Mbps which is very slow. Hence, it should not be used in a data/voice application.
  3. Category 3 twisted pair can transmit data with speed reaching 10Mbps which is slow for voice/data communication.
  4. Category 4 twisted pair can transmit data with speed reaching 16Mbps and is used in token ring networks. It is slow for communicating in a voice/data application.
  5. Category 5 twisted pair is the least qualified to be used in a voice/data application because it can transmit data at speeds that reach 100Mbps.

Hence, Cat 5 or Category 5 twisted pair is the least quality twisted pair that should be used in a data/voice application.

6 0
2 years ago
Which programming element is used by a game program to track and display score information?
lubasha [3.4K]
I think is Variablesss
7 0
2 years ago
Read 2 more answers
Find true or false. A hacker is hacking software with access in sensitive information from your computer​
Alina [70]
ITS TRUE!!I SEARCHED IT
7 0
1 year ago
Other questions:
  • In three to five sentences, describe whether or not files should be deleted from your computer.
    13·2 answers
  • Write a program in c or c++ to perform different arithmeticoperation using switch statement .the program will take two inputinte
    10·1 answer
  • Why would someone need to use tools like IECacheView or MyLastSearch on a system? Do companies have the right to search a workst
    11·1 answer
  • When configuring a record type, an App Builder can configure the available value of a picklist field for the page layout. Which
    9·1 answer
  • He volume of a sphere is 4/3πr3, where π has the value of "pi" given in Section 2.1 of your textbook. Write a function called pr
    5·1 answer
  • Write the definition of a function printAttitude, which has an int parameter and returns nothing. The function prints a message
    14·1 answer
  • ___________is used for drawing 3D objects in the field of Science and Engineering.
    12·2 answers
  • Why is it important for element IDs to have meaningful names?
    11·1 answer
  • Docker is focused on ______ containerization.
    7·1 answer
  • What is Accenture's role in Multi-party Systems?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!