1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
12

Jason is working on a project that requires him to manage a huge amount of data. The spreadsheet he is working on has data relat

ed to the
official budget from cell A1 through C9, and data related to actual expenditures from cell L1 through N19. How will Jason track and compare the
data as he works on the spreadsheet?
Computers and Technology
1 answer:
Delicious77 [7]3 years ago
8 0

Answer:

By using various tools.

Explanation:

<em>You can compare excel files and data using different tools which are available online and even in your local files. Listed below are the ways and procedure for you to compare data in excel: </em>

<em>1. By using Microsoft Word  </em>

<em>Procedure :  </em>

<em>1.1 Select cells with the data that you want to compare. Copy them or simply press Ctrl key and C key and paste in on a blank word document. Remember to select only the data that you need to compare not the whole worksheet at it may cause the document to load slower. </em>

<em>1.2 You should have two files. Old.doc which contains the old documents and New.doc which contains the changes that you have made on the previous document. </em>

<em>1.3 Using Microsoft Word, Go to Tools, then Track Changes then select Compare documents. </em>

<em>1.4 You can now view the changes from the old to new document </em>

<em>2. Using Microsoft Excel itself </em>

<em>Procedure: </em>

<em>2.1 Paste the old texts and contents in Cell A1. </em>

<em>2.2 Paste the new texts and contents in Cell B1. </em>

<em>2.3 In Cell C1, use the formula =IF(A1=B1,"","!") </em>

<em>2.4 Double click on the ,,+" when t shows in cell C1 </em>

<em>2.5 You can now see the two different versions of the texts. </em>

<em>3. You can use online tools which are available via search engines. </em>

You might be interested in
What is a good safety precaution to take when opening a computer case?
Anna11 [10]

Answer:

Place tape over the case edges that are sharp

6 0
2 years ago
Calculate how many different pixel colours could be formed if one of the bytes gives the intensity of the red colour, one of the
Elena L [17]

Answer: The three RGB colors are each 8-bits (possible values [0.. 255], 2 to the power of 8 = 256) of each of Red, Green, and Blue. The three 8-bit RGB components can create up to 256×256×256 = 16.7 million possible RGB color combinations, called 24-bit "color".

Explanation:

6 0
2 years ago
What is the maximum number of colors that should be used on a slide?
gavmur [86]
The most commonly accepted amount of colors on one slide is 4
7 0
2 years ago
Read 2 more answers
Question 6 (1 point)
Marysya12 [62]
<h2>answers</h2>

Extranet

wifi create extranet so that our mobile network runs smoothly. it can create lan,wan also

7 0
2 years ago
Erik is the president and owner of Watch Out, a local website development company that helps clients create and build unique web
11111nata11111 [884]

Answer:

A. Source code

Explanation:

In the field of Programming; Source code is the code written in high level language given to the computer to translate to machine -  executable code before executing. It is usually written and understood by human. It is closer to human like language, as it allows easier expression. It is mostly consist of english-like statement.

So, Erik would primarily be writing source code when performing his daily tasks since his daily task require high level of computer programming and internet knowledge.

5 0
3 years ago
Other questions:
  • The Windows Group Policy feature provides __________ that govern the way Windows operates in enterprise environments. a. a centr
    8·1 answer
  • The expressionvecCont.empty() empties the vector container of allelements.
    13·1 answer
  • When a Firewall is a hardware interface, it is referred as a
    6·1 answer
  • How can an administrator make only the files and folders to which a user has at least Read permissions visible?
    13·1 answer
  • What is blogging
    15·2 answers
  • What is the build in libary function to compare two strings?​
    15·1 answer
  • For each of the descriptions below, perform the following tasks:
    11·1 answer
  • Xxx<br>uuuuuu<br>uuuu<br>jjnmn<br>jjh
    12·1 answer
  • What is the output for this program?
    12·1 answer
  • You've just finished installing a wireless access point for a client. What should you do to prevent unauthorized users from usin
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!