1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FinnZ [79.3K]
3 years ago
14

In Excel, what happens to the cell contents when you click and drag a cell into multiple cells?

Computers and Technology
1 answer:
arlik [135]3 years ago
6 0

It is the same thing as copy and paste

You might be interested in
Use the drop-down menus to answer questions about the options in the Window group. Which command allows a user to view presentat
fredd [130]

Answer:

Look at the attached file for the correct answer to  this question on edge:

Explanation:

3 0
3 years ago
Read 2 more answers
What scheme is usually used today for encoding signed integers?
dusya [7]

Answer:

 For encoding signed integer the two's complement scheme are used as, the number can be positive, with no fraction part and it can be negative. The computer can stored information in the form of bits and the value with the zero and one. Encoding of signed number in the two's complement with the positive integer it can be done by binary number.

6 0
3 years ago
You just realized the turn signal on your vehicle is broken,
zimovet [89]

Answer:

c

Explanation:

7 0
4 years ago
Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and internal users. For security reasons, th
BigorU [14]

Answer:

c.Ports Fa3/1 and Fa3/2 on DSW1 will be defined as secondary VLAN isolated ports. Ports Fa3/34 and Fa3/35 will be defined as primary VLAN promiscuous ports.

Explanation:

Primary VLANs which can only be reached by using promiscuous port, comprises of the gateway and isolated VLANs for users to get out of a network.

The isolated ports can only communicate i.e send and receive data with the promiscuous ports; Fa3/34 and Fa3/35.

Also, WS_1 and WS_2 can neither send nor receive data with the data server, thus we isolate them.

3 0
4 years ago
Why do bats sleep upside down
seraphim [82]

Answer:

Bats cannot run so it would be almost impossible for them to take off from the ground. A major advantage to hanging upside down is that bats do not need to generate lift to begin flight. They just drop out of their bed, open their wings and off they go.

Explanation:

8 0
3 years ago
Other questions:
  • Software companies will often release a(n) ___ version to a limited audience that will test it on their systems. Programmers can
    11·1 answer
  • Which of the following best supports the utilization of environmental engineers on a civil engineering hydraulic project?
    13·1 answer
  • A PenTester has successfully exploited a remote host on a clients’ network. They want to create a backdoor on the host for futur
    11·1 answer
  • Why is redundancy of data undersirable?
    7·2 answers
  • What file extension is used to name a compressed folder
    10·1 answer
  • Write a method that accepts a string as an argument and returns a sorted string. For example, sort("acb") returns abc. Write a t
    6·1 answer
  • PLEASE HELP what is the mechanical advantage of a wheel with a radius of 8.0 cm connected with a axle with a radius of 2.5 cm?
    12·2 answers
  • Read a sentence from the console.
    6·1 answer
  • Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a f
    11·1 answer
  • A user may enter some text and the number of times (up to a maximum of 10) to repeat it. Display the text repeated that many tim
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!