1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
2 years ago
14

What are 3 customizations that can be done using the header/footer section in the customize reports tray?.

Computers and Technology
1 answer:
Vesnalui [34]2 years ago
4 0

The 3 customizations that can be done using the header/footer section in the customize reports tray are:

  • One  can customize the data, and also sum up that is add or delete columns, and also add or delete information on the header/footer.

<h3>What is the customizations  about?</h3>

In the case above, a person can also be able to personalize the font and style of the given report that they have.

Note that a lot of  columns and filters differ for all kinds of  report/group of reports and as such, The 3 customizations that can be done using the header/footer section in the customize reports tray are:

  • One  can customize the data, and also sum up that is add or delete columns, and also add or delete information on the header/footer,

Learn more about customizations from

brainly.com/question/3520848

#SPJ1

You might be interested in
Outside of a C program, a file is identified by its ________while inside a C program, a file is identified by a(n) ________. fil
Alexxandr [17]

Answer: name, file stream object

Explanation:

4 0
2 years ago
Which access control principle limits a user's access to the specific information required to perform the currently assigned tas
Svetradugi [14.3K]

Answer:

The answer is "Need-To-Know Access Control Principle"

Explanation:

There are three types of access control methods such as Role-Based Access Control, Discretionary Access Control and Mandatory Access Control.

The access control principle that limits/blocks the user from gaining access to a folder/information/procedure within the system is called "Need-To-Know Access Control Principle".

I hope this answer helps.

4 0
3 years ago
Conceptos importantes de red de computadoras
Bumek [7]

Answer:

-Consiste en conectar varias redes de computadoras basadas en diferentes protocolos -Requiere la definición de un protocolo de interconexión común sobre los protocolos locales. -El Protocolo de Internet (IP) desempeña este papel, definiendo direcciones únicas para una red y una máquina host.

3 0
3 years ago
What is a sound wave
solmaris [256]

Answer:

A wave of sound!

Explanation:

sound waves are sound but sound comes in different wavelengths

7 0
3 years ago
Read 2 more answers
A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. A
Lady_Fox [76]

Answer:

Implement a blacklist on the firewall and add the site the users are visiting.

Explanation:

A manager in a small office is asking if it is possible to limit network access to a particular website during business hours. Apparently, several users are spending an excessive amount of time on the site preventing them from completing their work-related tasks. The best solution to accomplish the request from the manager is to implement a blacklist on the firewall and add the site the users are visiting.

3 0
3 years ago
Other questions:
  • What is one way to maintain Internet safety? a) avoid interacting with people on the Internet. B) avoid giving out information a
    7·1 answer
  • 1. What are the built-in operations on classes?
    8·1 answer
  • True or false that computers that are joined together are able to share hardware and software, but not data
    11·1 answer
  • Software that translates the sound of human voice into text is called:________.
    14·1 answer
  • Radio and television are examples of
    9·1 answer
  • Why is there no ide length or timing for study breaks?​
    12·1 answer
  • Is backing up computer files done on the hard drive?
    14·2 answers
  • What is DMTS. Explain it​
    10·2 answers
  • How do you use switch board in the office​
    6·1 answer
  • The first person to say something in here will get brainliested.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!