1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergey [27]
3 years ago
11

Gina's teacher has sent her a Word document that contains the names of all the students who are participating in the

Computers and Technology
2 answers:
-Dominant- [34]3 years ago
5 0

Answer:

The fourth option is the correct option, We need to copy the names from the word document and paste it in the excel sheet.

Just copy the names from the word document and then paste it in the excel sheet. Nothing else is required. You can make use of the keyboard tricks for copying and pasting, or you can make use of the mouse.

And you can paste any number of names from word to the sheet.

Explanation:

The answer is self explanatory.

Neko [114]3 years ago
3 0

Answer:

it is the fourth option: by copying the names from the Word document and pasting them into the Excel spreadsheet

Explanation:

You might be interested in
Which pair of Information Technology career fields may require work to be done outside of normal office hours? interactive media
scZoUnD [109]

Answer:

The answer to this question is "information services and support and network system administration".

Explanation:

The information support and service and network system administration is used to outside work, which can be explained as follows:  

  • The information support and service process is using information processing that is defined as the system for record-keeping, forms, figures and data in a business.  
  • A network or device system administrators are responsible for the day-to-day deployment of all these networks. They arrange, restore, and promote the computer systems of the company, which include local area networks, WANs, system sections, web services, and other wireless communication systems. The system provides local area networks.

6 0
3 years ago
Read 2 more answers
A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a use
Andrej [43]
Malware
Hope this helps
3 0
3 years ago
Cryptography is the science of secret writing. Cryptography involves creating written or generated codes that allow information
Rudiy27

Answer:

true

Explanation:

the answer is true dude

5 0
2 years ago
The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
Keith_Richards [23]

Answer:

import java.util.Scanner;

public class Main {

 public static void main(String[] args) {

   double total = 0;

   double fPrice, sPrice, tPrice;

   int firstN = 0, secdN = 0, thirdN = 0, fTime, sTime, tTime;

   int totalT = 0;

   isEnd = "n";

   for (;;){

       if (isEnd == "y"){

           break;

       }

       Scanner in = new Scanner(System.in);

       int option = in.nextInt();

       switch (option){

         case 1:

             fPrice = 2.50;

             fTime = 5;

             System.out.print("Enter number of items: ");

             firstN += in.nextInt();

             totalT += fTime * firstN;

             total += fPrice * firstN;

             break,

         case 2:

             sPrice = 3.75;

             sTime = 7;

             System.out.print("Enter number of items: ");

             secdN += in.nextInt();

             totalT += sTime * secdN;

             total += sPrice * secdN;

             break,

         case 3:

             tPrice = 5.99;

             tTime = 12;

             System.out.print("Enter number of items: ");

             thirdN += in.nextInt();

             totalT += tTime * thirdN ;

             total += tPrice * thirdN;

             break,

        default:

             System.out.println("Looking forward to the Weekend");

       }

       System.out.print("Do you want to end the order? y/n: ");

       isEnd = in.nextLine();

   }

   System.out.println("Number of Type 1 candles bought : "+firstN);

   System.out.println("Number of Type 2 candles bought : "+secdN);

   System.out.println("Number of Type 3 candles bought : "+thirdN);

   System.out.println("Total cost is : "+total);

   System.out.println("Total burn time is : "+totalT);

   double costPerBurn = (totatT * 60) / total;

   System.out.println("Cost per minute : "+ costPerBurn);

 }

}

Explanation:

The Java program creates a continuous for-loop statement that gets the candle type, price and amount ordered from a switch and accumulates the total cost and burn time of the candles bought and the cost per minute burn of the candles consecutively.

3 0
3 years ago
Thomas drew a rectangle with an area of 6 square cm what is the greatest possible perimeter of this rectangle
lisabon 2012 [21]
The greatest possible perimeter would be 14cm.

3 0
3 years ago
Other questions:
  • What limits the impact of vehicle balance on view ghost ability during emergency vehicle maneuvers?
    15·1 answer
  • How do you adjust the shear of a shape?
    10·2 answers
  • 1.
    8·1 answer
  • Write a program that records high-score data for a fictitious game. the program will ask the user to enter five names, and five
    12·1 answer
  • How can volunteering to help plan a fundraiser for your team or club be a way
    7·1 answer
  • NEED HELP ASAP!!!!!!!!!!
    10·2 answers
  • What network problems can be solved on your<br> end?
    13·2 answers
  • What is web browser <br>​
    7·2 answers
  • What Microsoft feature enables you to represent text as colorful visuals
    12·1 answer
  • Write the text of the program in Python.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!