1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
____ [38]
4 years ago
14

You can tell a cell is the active cell when it has a A. colored border and data you type will appear next to it. B. bold border

and data you type will appear next to it. C. colored border and it is where the data you type will appear. D. bold border and it is where the data you type will appear.
Computers and Technology
2 answers:
lisov135 [29]4 years ago
7 0

To know which cell is an active cell, you just need to click on a cell. When that happens, (C) colored border and it is where the data you type will appear.

The colored border would be in green and whatever you type would appear in this cell as well. The other options are incorrect because the borders might look bolded, but its most important feature is the color change.

Gnom [1K]4 years ago
4 0
The correct answer is D.
You might be interested in
Write a function that is named times_ten and accepts a number as an argument. When the function is called, it should return the
Stells [14]

It changes a little depending on what programming language you're using, but in C you could say

int times_ten (int num) {

    num = num*10;

    return num;

}

Or, in general terms:

Integer Function times_ten (Integer num)

    Set num = num * 10

    Return num

This is all done assuming the number used as an argument is an integer and that you are returning an integer value, not a decimal. The main thing to notice is that since you have to return a value, you must have two things: a return statement, and a type declaration for the function, otherwise you'll get an error.

4 0
3 years ago
Give 8 examples of Synchronous communication
SpyIntel [72]

Answer:

Synchronous communication examplesinclude: instant messaging, video conferencing, webcams, MUDs, MOOs, chat, Second Life. Examples of one-to-one synchronous communication include: instant messaging. Examples of one-to-manysynchronous communication include: video conferencing, MUDs, and MOOs.

5 0
3 years ago
Which of the following is most likely to be a result of hacking? Group of answer choices slowing of network speed certain Web si
olchik [2.2K]

Answer:

The correct answer to the following question will be "an unauthorized transaction from the credit card of a user".

Explanation:

Hacking was the catch-all word for some form of software misuse or exploitation that violates the protection of someone's computing device for stealing data, corrupting systems or information, manipulating the infrastructure or in some way disrupting related to data-activities.

  • The current popular type involves the phishing scam, whereby hackers or attackers try to obtain username names as well as their passwords or add vulnerabilities to networked processing ecosystems by tricking clients through accessing a mail file or transmitting confidential data.
  • The other options are not related to the given scenario like hacking. So, above it the right answer.
3 0
3 years ago
What command would you use to place the cursor in row 10 and column 15 on the screen or in a terminal window
Kryger [21]

Answer:

tput cup 10 15

Explanation:

tput is a command for command line environments in Linux distributions. tput can be used to manipulate color, text color, move the cursor and generally make the command line environment alot more readable and appealing to humans. The tput cup 10 15 is used to move the cursor 10 rows down and 15 characters right in the terminal

4 0
3 years ago
What game is this?????????????????????
andre [41]
Sonic the hedgehog

Hope this helps you broski
5 0
3 years ago
Other questions:
  • To remove any hidden days from your document before sharing it, what should you do?
    7·1 answer
  • These things are commonly found on the front of desktop computer cases:
    12·1 answer
  • Amy has decided to use a dark background and light colored text for her prensentation. Which toolbar option will let her change
    5·1 answer
  • Why is the Vigenere cipher hard to crack? (select 2)
    6·1 answer
  • The ____________________ packet-filtering firewall allows only a particular packet with a particular source, destination, and po
    10·1 answer
  • A colleague asks you to research a CPU for a new server that will run Windows Server 2019. He explains the server roles that he
    7·1 answer
  • Create an application for a library and name it FineForOverdueBooks. TheMain() method asks the user to input the number of books
    7·1 answer
  • Google Glass, glasses that allow you to take pictures and search online by speaking commands, are introduced at a technology tra
    8·1 answer
  • For the purposes of laying out content, the total height of a box is calculated by adding which of the following?
    5·1 answer
  • Is this code object-oriented, or is it procedural? what clues in the code itself did you use to determine what kind of code it i
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!