1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paul [167]
3 years ago
9

Filtering removes data from the spreadsheet. A. True B. False

Computers and Technology
2 answers:
____ [38]3 years ago
5 0
6 is false
7 is false
8 is true
Y_Kistochka [10]3 years ago
4 0
<span>A cell has an unlimited number of conditions for Conditional Formatting.

A. True

B. False

This is  A. rue I just took the test
</span>
You might be interested in
What is one advantage of using the sharing tab vs. the security tab to give out permissions?
Hoochie [10]

Answer:

Depending on what operating system you have my best choice would be D since on some folders you can share permissions with other people. It really depends on what computer you're talking about.  

8 0
3 years ago
Prepare a document to list down at least 10 features/operations (on process and thread) you can do using Process Explorer.
leonid [27]

Answer:

The operations that can be carried out using process explorer include but are not limited to:

Explanation:

  1. Killing a Process Tree
  2. Ending or terminating a process
  3. Suspending a process
  4. Examining which process has locked a file
  5. Manually detecting a virus
  6. Unhiding a process. This can help to callup the window for a process that is not visible under normal explorer activities
  7. Monitor CPU usage
  8. setting the priority of a process
  9. changing a service process's access security
  10. Monitoring Graphics Processing Unit

Cheers

6 0
2 years ago
Zeke used primarily Web sources for his informative speech about gun control. However, his over-reliance on the website sponsore
Andreas93 [3]

Answer:

a. Objectivity

Explanation:

Zeke ignored objectivity as a criteria for evaluating Web sources.

7 0
3 years ago
In cell E13, create a formula using the AVERAGE function
lukranit [14]
USE SOCRACTIC IT WOULD REALLY HELP WITH QUESTIONS LIKE THIS
3 0
3 years ago
Read 2 more answers
Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and det
Marrrta [24]

Answer: Option B. System logs

Explanation:

A system log contains records of events that are logged by the operating system components. These events are often predetermined by the operating system itself and they indicates how the system processes and drivers were loaded. System log files may contain information about device changes, device drivers, system changes, events, operations and more.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Return the "centered" average of an array of ints, which we'll say is the mean average of the values, except ignoring the larges
    6·1 answer
  • The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use
    6·1 answer
  • In which table is the input and the corresponding output of a Boolean function listed? How is the output of the NAND gate determ
    9·1 answer
  • What is information technology?
    9·1 answer
  • 1. Which sentence best expresses the main idea
    12·1 answer
  • What does a for loop look for in the sequence of data? Check all that apply.
    6·2 answers
  • 1. Describe the sequencing of factors influencing health status codes for patients that also have chronic conditions being manag
    6·1 answer
  • Digital communication and production chapter 17
    6·1 answer
  • The field of ____ is concerned with the technical issues involved in information display. computer science
    14·1 answer
  • when inputting a formula into excel or other spreadsheet software, what components are required for the formula to function prop
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!