1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
2 years ago
6

You can use the keyboard/mouse, Insert Function box, and Sum button menu to insert functions in a formula. Which method do you p

refer
Computers and Technology
1 answer:
Alex777 [14]2 years ago
7 0

The preferred method is using the keyboard/mouse to insert functions into formula

<h3>How to determine the preferred method?</h3>

The scenarios are given as:

  • Insert functions using the keyboard/mouse
  • Insert functions without using the keyboard/mouse

Using the keyboard and the mouse to insert functions would be faster and more efficient, compared to not using the keyboard and the mouse

Hence, the preferred method is using the keyboard/mouse

Read more about keyboard and mouse at:

brainly.com/question/1245638?source=archive

#SPJ1

You might be interested in
What are the three general methods for delivering content from a server to a client across a network
Tju [1.3M]

Answer:

Answered below.

Explanation:

The three general methods consist of unicasting, broadcasting and multicasting.

Casting implies the transfer of data from one computer (sender) to another (recipient).

Unicasting is the transfer of data from a single sender to a single recipient.

Broadcasting deals with the transfer of data from one sender to many recipients.

Multicasting defines the transfer of data from more than one sender to more than one recipients.

8 0
3 years ago
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
aksik [14]

Answer: (B) An insider

Explanation:

 According to the question, an Angela is an insider as she maintain all the sensitive and confidential information of the customer like the password, username,SSN (Social security number) and the personal information.

Angela and her co-worker has the right for using the customer sensitive information and data. An insider is the person who keeps all the sensitive information of the organization or company.

5 0
3 years ago
Convert the following MIPS instruction to its binary and hex representations by doing the following: On first line, type registe
Firdavs [7]

Answer:

To make the group of four we can write 100011 as 00100011

Now, the two groups are:- 0010 and 0011

And 0010 in binary corresponds to 3 in Hexadecimal

And 0011 in binary corresponds to 4 in Hexadecimal.

So, 100011 of binary corresponds to 34 of hex.

3 0
3 years ago
The commands available from a menu do not change. True or false
jeka94

i believe this will be false


3 0
3 years ago
Read 2 more answers
Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on you
Brums [2.3K]

Options:

A Infrastructure mode

B Ad hoc mode

C a wireless access point

D static IP addresses

E APIPA

Answer:

A. Infrastructure mode

C. a wireless access point

Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).

8 0
3 years ago
Other questions:
  • What view is In a presentation program displays your slides in full screen mode
    6·1 answer
  • In report design view, you can use commands on the align button of the _____ tab.​
    11·1 answer
  • A very simple device that connects network components and sends packets of data to all other connected devices is called a _____
    5·1 answer
  • A customer comes into a computer parts and service store. The customer is looking for a device to help a person with accessibili
    5·1 answer
  • The method main of a class is called when you instantiate an object of that class like this: Box myBox = new Box();
    9·1 answer
  • Which CIDR network has the smallest possible number of hosts? a. 123.0.0.0/8 b. 123.45.0.0/16 c. 123.45.67.0/24 d. All have the
    10·1 answer
  • Write 3 things that can't be done without technology. write your opinion?
    14·2 answers
  • What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud co
    15·1 answer
  • What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records
    8·1 answer
  • True or false. windows server standard edition supports software-defined networking
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!