1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
12

Jason is working on a project that requires him to manage a huge amount of data. The spreadsheet he is working on has data relat

ed to the
official budget from cell A1 through C9, and data related to actual expenditures from cell L1 through N19. How will Jason track and compare the
data as he works on the spreadsheet?
Computers and Technology
1 answer:
Delicious77 [7]3 years ago
8 0

Answer:

By using various tools.

Explanation:

<em>You can compare excel files and data using different tools which are available online and even in your local files. Listed below are the ways and procedure for you to compare data in excel: </em>

<em>1. By using Microsoft Word  </em>

<em>Procedure :  </em>

<em>1.1 Select cells with the data that you want to compare. Copy them or simply press Ctrl key and C key and paste in on a blank word document. Remember to select only the data that you need to compare not the whole worksheet at it may cause the document to load slower. </em>

<em>1.2 You should have two files. Old.doc which contains the old documents and New.doc which contains the changes that you have made on the previous document. </em>

<em>1.3 Using Microsoft Word, Go to Tools, then Track Changes then select Compare documents. </em>

<em>1.4 You can now view the changes from the old to new document </em>

<em>2. Using Microsoft Excel itself </em>

<em>Procedure: </em>

<em>2.1 Paste the old texts and contents in Cell A1. </em>

<em>2.2 Paste the new texts and contents in Cell B1. </em>

<em>2.3 In Cell C1, use the formula =IF(A1=B1,"","!") </em>

<em>2.4 Double click on the ,,+" when t shows in cell C1 </em>

<em>2.5 You can now see the two different versions of the texts. </em>

<em>3. You can use online tools which are available via search engines. </em>

You might be interested in
What's the difference between kilobyte and kibibyte, and why was the IEC convention for computer international memories made???
Masja [62]

Answer:

The Kibibyte was developed to take place of the kilobytes in the computer science context where the Kilobyte stands for 1024 bytes. And the Kilobyte interpretation to mean 1024 bytes, conflicts the Standard definition of the prefix kilo or 1000. And the IEC convention for computer international memories was made to define the international standards for electrical, electronic and related technologies.

Explanation:

Please check the answer section.

8 0
3 years ago
Least common multiple of 78,90, and 140
Daniel [21]
The least common multiple (LCM) of 78, 90, and 140 is: 16,380

78 × 210 = 16,380
90 × 182 = 16,380
140 × 117 = 16,380
5 0
3 years ago
Read 2 more answers
3. Do some Internet research on the use of VLANs in hospitals. Summarize the benefits of using VLANs in hospitals and identify e
motikmotik

VLAN refers to Virtual Local Area Network. It is a subnetwork that can group together collection of devices on separate physical Local Area Networks. VLANs allow network administrators to group hosts together even if the hosts are not directly connected to the same network switch.

Considering the large number of departments in hospitals, with each departments having functions different from the others, Virtual LANs allows various users(the departments) to be grouped together according to their networking needs, regardless of their actual physical locations. Subdividing the LAN into smaller segments, or VLANs, increases overall reliability, security, and performance, and makes the network easier to maintain.

Because of the largeness of St. Luke's hospitals and their mission of delivering highly reliable and feature-rich advanced network solutions, virtual LAN will help to provide a resilient and scalable network solution within the hospital's budget.

St. Luke should implement virtual LAN that can produce a higher bandwidth with lower-cost, a longer-term model based on servers, networking products and homogenous network components to deliver centralized management of computing across the hospital network.

5 0
3 years ago
Read 2 more answers
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
kumpel [21]

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

8 0
3 years ago
What is a dropcap as used in a computer word document
shutvik [7]

DROP CAP:-

<u>Drop caps are a specific kind of initial letter, large letters that appear at the beginning of a block of text. ... A drop cap is often used to signify that the reader's moved into a significant new section, or that a new chapter's begun.</u>

<u>Drop caps are a specific kind of initial letter, large letters that appear at the beginning of a block of text. ... A drop cap is often used to signify that the reader's moved into a significant new section, or that a new chapter's begun.A drop cap (dropped capital) is a large capital letter used as a decorative element at the beginning of a paragraph or section. The size of a drop cap is usually two or more lines. The following illustration shows your options for positioning a drop cap.</u>

3 0
2 years ago
Other questions:
  • The FaceSnap app has permission to use many devices on your smartphone, including the camera. A data privacy concern that arises
    6·1 answer
  • Kelvin owns a small trading firm. Recently, he suspected that some of his employees were using fraudulent activities for their p
    5·2 answers
  • What is a computer dedicated to a single function, such as a calculator or computer game? A. TabletB. PDAC.ApplianceD. Minicompu
    6·1 answer
  • A message M is encapsulated by the TCP, IP and Ethernet protocols in that order as it travels down a protocol stack. What does t
    5·1 answer
  • A business letter is not written:
    6·1 answer
  • You are now going to prepare some reports for the company. Measurements are in metres and volume
    7·1 answer
  • What's your opinion on Pokemon​ and pixeldip
    5·1 answer
  • Please Answer ASAP!!
    15·1 answer
  • You are a teaching assistant for an introductory computer concepts course at your local community college. The instructor asks y
    11·1 answer
  • attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!