1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
2 years ago
14

you want to be able to restrict values allowed in a cell and need to create a drop-down list of values from which users can choo

se. which feature should you use?
Computers and Technology
1 answer:
STALIN [3.7K]2 years ago
8 0

The  feature to restrict values allowed in a cell and need to create a drop-down list of values from which users can choose in the above scenario is data validation.

<h3>What is data validation?</h3>

Data validation is a term that connote the act of monitoring the truthfulness and quality of source data before one can make use of it, importing or even  process data with it.

Note that The  feature to restrict values allowed in a cell and need to create a drop-down list of values from which users can choose in the above scenario is data validation as it ensure that users can make their own choice.

Learn more about data validation from

brainly.com/question/27138101

#SPJ1

You might be interested in
#It helps in the proper function ing of computer hardware.
zalisa [80]
4- system software
2- application software
4- software package
1- assembler
2- antivirus program
3 0
3 years ago
Does technology make us more alone?
Anika [276]
Both yeah and no, depending on personal opinion
3 0
3 years ago
A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
Lunna [17]

The answer to this question is a firewall. A Firewall is a network security system that blocks and prevent unauthorized use or access of company’s network. Firewall is also a program that screens and restricts viruses and other users like hackers to reach the network through the internet. 

3 0
4 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
What was Leonardo da Vinci an expert in
Ipatiy [6.2K]

Leonardo da Vinci was a very famous painter. I would assume that he is an expert in painting.

Hope this helped

5 0
3 years ago
Other questions:
  • If a surface is. it is exactly vertical
    11·1 answer
  • How to the inverse function of f(x)=x2 +1 ,x&gt;o
    5·1 answer
  • Which of the following takes place during the research phase
    7·1 answer
  • One reason to buy a home instead of rent a home is:
    5·1 answer
  • F he continues to make monthly payments of $100, and makes no new purchases, how many more payments will he have to make before
    13·1 answer
  • How do I get the most points, without any effort?
    11·2 answers
  • Question 21 pts How many lines should an email signature be? Group of answer choices "5 to 6" "7 to 8" "1 to 2" "3 to 4"
    10·1 answer
  • 3. Discuss microprocessor components, chips,
    15·1 answer
  • Write a function named last_digit that returns the last digit of an integer. For example, last_digit(3572) should return 2. It s
    5·1 answer
  • How to get someone off your best friends list without blocking them
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!