1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
2 years ago
12

manny copied a table from an ms excel file, closed the file, and then pasted the table in an ms word document. where was the tab

le stored after he copied it?
Computers and Technology
1 answer:
Anit [1.1K]2 years ago
5 0

Manny copied a table from an ms excel file, closed the file, and then pasted the table in an ms word document, the table was stored in the RAM after he copied it.

Copying data from one worksheet to another in Excel VBA is a common practice when working with many worksheets. For instance, we would automate a procedure that required gathering data from various worksheets (some times different workbooks).

In this case, we must copy a portion of the worksheet and paste it into the desired worksheet.

It's possible to encounter an error notice when attempting to open a Word document or carry out a task in Word "Neither the memory nor the disk space are adequate. Close further windows, then retry "or an equivalent.

Even when your computer has enough of RAM and hard drive space available, errors can still occur even when the message precisely identifies the issue.

To know more about word click on the link:

brainly.com/question/11695086

#SPJ4

You might be interested in
* what is an electronic mail ?
Vikki [24]

Answer:

Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.

6 0
3 years ago
Diferencia entre tipo de datos simple char y compuesto cadena​
fomenos
Man i do not speak spanish L
3 0
3 years ago
What are the high and low temperatures on Saturn? (C)
slava [35]
Saturn contains three layers of clouds. The upper layers of ammonia ice have temperatures ranging from minus 280 F to minus 170 F. The next layer contains water ice, with temperatures from minus 127 F to 26.Temperatures in the lower layers climb as high as 134 F.
8 0
3 years ago
How are a members details be checked and verified when they return to log back in to the website ?
aksik [14]

Answer:

When you sign into a website, you have to enter a password and username most of the time, which will allow the website to know that you have checked in and it is you, who is using your account.

6 0
3 years ago
Jamie Lee is beside herself knowing that the thieves had unauthorized use of her debit/ATM card. What is Jamie's financial respo
Rama09 [41]

Jamie's financial responsibility for the unauthorized use is dependent on how fast she report the theft of her debit/ATM card.

Since Jamie Lee is dealing with an unauthorized use of  her ATM or debit card,  she ought to  act quickly so as  to avoid full liability for unauthorized charges since her card was stolen.

According to Federal laws and bank policies, Under the Federal Electronic Fund Transfer Act, the following  liability applies:

  •  $0 if she  reports the theft of the card immediately before any unauthorized charges are made.
  • She would be charged up  to $50 if she  notifies  the bank within two business days after she  realized the theft.
  • She would be charged up to $500 if she fails to notify the bank within two business days after the theft  but does notify the bank within 60 days after her  bank statement is mailed to her with a list of  the unauthorized withdrawals.
  • She wold be charged unlimited charges if she  fails to notify the bank within 60 days after her bank statement is mailed to her listing the unauthorized withdrawals.

From the polices applicable, It is necessary that Jamie Lees  notifies the bank or card issuer of the theft as soon as possible so as not to incur much financial responsibilites for the unauthorised use.

Read on to learn about  unauthorized use debit/ATM card: brainly.com/question/21485510

8 0
2 years ago
Other questions:
  • Currently James’s company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. How
    10·1 answer
  • To track website behavior data with google analytics, which steps will you need to complete?
    14·1 answer
  • Which of the following applies to a DNS caching server? (Choose all that apply.)
    6·1 answer
  • The total number of errors divided by the total number of bits transmitted is the definition of __________. committed informatio
    14·1 answer
  • We see color because an object that has light striking it
    7·1 answer
  • Write a function using statements called Print Reportl) which will take no float
    10·1 answer
  • How do I send the face to the back? Seriously, I can't find out how...
    13·1 answer
  • Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users im
    8·1 answer
  • Write a function template that accepts an argument and returns its absolute value. The absolute value of a number is its value w
    11·1 answer
  • Your child has broken the RJ-45 port of your laptop by sticking clay into it and there are no wireless networks available in you
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!