1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhuklara [117]
3 years ago
14

PLEASE HELP

Computers and Technology
2 answers:
Sergio [31]3 years ago
4 0
The_____ feature of the spreadsheet will enable Susan to highlight the records.
FORMAT CELLS
Scorpion4ik [409]3 years ago
3 0

Susan is a bookstore owner who maintains sales records in a spreadsheet. She wants to highlight the records that show sales in excess of 100 books per day. Which spreadsheet feature will enable her to highlight the records?

The  ________feature of the spreadsheet will enable Susan to highlight the records.

Answer: Conditional Formatting

You might be interested in
Which of the following is part of the cycle of dating violence
katen-ka-za [31]

Dating violence is a pattern of behavior where one person threatens or actually use

Physical, sexual, emotional, or verbal abuse to control his or her dating partner.

Examples of physical abuse are

Hitting, shoving, kicking

Examples of sexual abuse are

touches you when you don't want them to, forces you to watch dirty things,  

intercourse, fondling, exhibitionism, voyeurism, exploitation, prostitution & exposure to body parts.

Examples of verbal and emotional abuse

Insults, belittling, name calling, blaming, humiliation & false accusations.

Abuse is a

The deliberate infliction of harm or the threat of harm to a vulnerable person

Abusers in teen dating relationships, use behaviors of

Fear and intimidation

The only person that can choose to stop the violence is the

Abused.

Signs of an abused teen

Do poorly in school, have low self-esteem, may cry frequently, & may have trouble learning.

Abused teens even contemplate or attempt

Suicide

1 in 11 teens report being victims

Physical dating violence each year.

6 0
4 years ago
Advantages of email over traditional mail​
dalvyx [7]

Answer: emails are delivers very fast compared to regular traditional mail

Explanation:

6 0
1 year ago
These are the records and traces an individual leaves behind as they use the internet
Roman55 [17]

Answer:

Option D. Digital footprints

Explanation:

<u>Digital footprint is all the stuff you leave behind as you use the Internet.</u>

4 0
3 years ago
Read 2 more answers
Explain why regular system cleanup is vital to ensuring the operating system runs efficiently.
Oksanka [162]
Cleaning up a system helps clear up the space on the drives. It may also clear up processor usage, ram usage if you uninstall programs that automatically started when the system booted. You may also delete some unwanted programs in the process.
5 0
3 years ago
What are the MOST likely reasons that a student would research a topic using the internet?
Airida [17]

Answer:

To help with them with their work

5 0
3 years ago
Read 2 more answers
Other questions:
  • Universal containers has included its orders as an external data object in to Salesforce. You want to create a relationship betw
    7·1 answer
  • Enter a nested lookup function in cell E4 that uses the cells E2 and E3 to return a specific sales record. For example, using th
    14·1 answer
  • Where are all of your documents saved?
    14·2 answers
  • Most search sites use a ____, a software program in conjunction with a huge database of information about web pages to help visi
    15·1 answer
  • Can you see it now ivy97? I've posted it again.
    8·1 answer
  • Which shape denotes a process to be carried out in a flowchart?
    7·2 answers
  • Which of the following statements best describes the relative amount of content held by digital libraries vs. the amount held by
    12·1 answer
  • Using a while loop, create an algorithm extractDigits that prints the
    6·1 answer
  • Write a program that reads and unspecified number of integers, determines how many positive and negative values have been read,
    10·1 answer
  • What is the password based off of the clues
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!