1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
2 years ago
11

What are 3 customizations that can be done using the header/footer section in the customize reports tray?.

Computers and Technology
1 answer:
Viktor [21]2 years ago
5 0

The 3 customizations that can be done using the header/footer section are:

  • One can customize a given data,
  • Also add or delete columns.
  • Also add and also remove information.

<h3>What is the function about?</h3>

A person can customize and also personalize the font and style of the report through the use of the header/footer section in the customize reports tray.

Therefore, The 3 customizations that can be done using the header/footer section are:

  • One can customize a given data,
  • Also add or delete columns.
  • Also add and also remove information.

Learn more about header/footer  from

brainly.com/question/14379814

#SPJ1

You might be interested in
In Scratch, you have to choose backdrops from a limited number in the Scratch image library.
forsale [732]
I would say it would be True
5 0
3 years ago
True or false mobile devices need to work within limited screen space
eduard
A phone may have a 4 inch screen and so it cant just extend to 5 inches. So it would he true
3 0
3 years ago
Read 2 more answers
Draw the Abstract Syntax Trees for the following statements and represent them in text form. i) 1+2+3 ii) 6÷3×4+3
MArishka [77]

Answer:

your a legend you can do it just pleave

Explanation:

:)

5 0
3 years ago
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
If you want to refine your Google search results by date, which option should you use?
just olya [345]
Try using ctrl, shift, delete
7 0
3 years ago
Other questions:
  • Given an list of N integers, Insertion Sort will, for each element in the list starting from the second element: Compare the ele
    8·1 answer
  • On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance
    10·1 answer
  • What is wrong with each of the following?
    6·1 answer
  • In order to install a device, the operating system needs the required __________ for that device.
    13·2 answers
  • How is a website most likely to distinguish its different sections?
    8·1 answer
  • Reading for comprehension requires _____ reading?
    7·1 answer
  • Help please
    13·2 answers
  • Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional
    7·1 answer
  • Suppose that each country completely specializes in the production of the good in which it has a comparative advantage, producin
    8·1 answer
  • Edhesive 9.3 code practice
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!