1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
romanna [79]
3 years ago
10

Which Excel file extension stores automated steps for repetitive tasks?

Computers and Technology
2 answers:
Marianna [84]3 years ago
4 0

Excel Macros, or .xlsm, stores automated steps for repetitive tasks.

DiKsa [7]3 years ago
3 0

Answer: for Pluto is Xlsm

Explanation:

You might be interested in
Files and e-mail messages sent over the Internet are broken down into smaller pieces called _____.
Fynjy0 [20]
Files and email messages sent over the internet are broken down into smaller pieces called packets
6 0
3 years ago
Applying what formatting option to your excel workbook will make it easier to read when printed out?
blagie [28]
Portrait, as well as 100 percent scale.
8 0
2 years ago
I just got an A on 27 test today so free points
vodomira [7]

Answer:

Good Job

Explanation:

lol did you study

8 0
3 years ago
Read 2 more answers
Its inventiveness uncertainty and futuristic ideas deals with science and technology,what is it?
Sedaia [141]

Answer:

Capital FM

Explanation:

8 0
3 years ago
4) Short answer questions<br>c) What is Cyber Law?​
Kamila [148]

Answer:

Kindly check explanation

Explanation:

Laws refer to legal rules and regulatory framework which is used as a guiding principle to define the actions and behavior which may lead to incurring penalties if boundaries are trespassed.

The word 'Cyber' is popularly used to describe activities, actions and interactions involving the internet. With the burst and continous pace of digital transformation, the internet also called Cyberspace is in a world of its own. Hence, the creation of rules to govern internet interactions.

Cyber laws may thus be explained as codified laws which are designed and implemented to govern all forms of possible online interaction or transactions in other enhance cyber security to protect the interest of persons and data from various forms of internet threats. Cyber laws include ; Data protection laws, Computer crime laws, telecommunication laws and so on.

6 0
3 years ago
Other questions:
  • Which term is used to describe the science of examining raw data, removing excess noise from the dataset, and organizing the dat
    15·1 answer
  • Different organizations implement different Information Systems base on their core business operations. explain
    14·1 answer
  • During which part of geologic time were dinosaurs most common?
    11·2 answers
  • How many people employed in the United States work in a job related to digital media?
    12·1 answer
  • Yall like portal 1 or 2
    8·1 answer
  • Explain what 10CLS program does and the write the output​
    13·1 answer
  • How is an interpreter different from a compiler?
    9·2 answers
  • Dynamic programming does not work if the subproblems: ___________
    5·1 answer
  • What is Parallelism? And what is Pipelining?<br> Can someone please explain them fully?!
    14·1 answer
  • What was the pascaline used for?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!