1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laiz [17]
3 years ago
6

When you right-click a spreadsheet object, what command should you select to activate the sheet?

Computers and Technology
2 answers:
Shtirlitz [24]3 years ago
8 0
If by activate you mean open, then it would be A.
If by activate you mean, open to edit data, then it would be B.
If activating means edit the object itself, then its D.
miss Akunina [59]3 years ago
5 0
I would think the answer is C. Hope this helps! :D
You might be interested in
Search the link <br><br> gKuJXd3zYDc<br><br> Subscribe I have a vid premiering soon
lawyer [7]
I will hope this helps :p
5 0
3 years ago
Q4. Write down the JavaScript statements to perform the following tasks.
goldenfox [79]

Answer:

Explanation:

In Javascript, you can accept an input value by using the prompt() function and saving the input into a variable. In the following lines of code, I have declared the three variables at the beginning and then prompted the user to enter a value for each and saved the values in the correct variables. In Javascript length is a keyword so I used len instead.

let base, height, len;

base = prompt("Enter Base value: ");

height = prompt("Enter Height value: ");

len = prompt("Enter Length value: ");

5 0
3 years ago
How can the connection to salesforce be restricted only to the employee portal server? Universal containers (UC) uses a legacy E
Ad libitum [116K]

Answer

To restrict the connection only to the employee portal server, the IP address of the application should be added into the list of Trusted IP's.

Explanation:

Trusted IP's are the IP's that are used to identify the users that can be verified easily. Those users whose IP's are not listed in the trusted IP list needs to verify their identity by sending them login code on each transaction.

<em>In above mentioned case, We need to enlist the IP address of employee portal list in trusted IP list to ensure the restriction of login to employee only.</em>

4 0
3 years ago
In the source-code file containing a class’s member function definitions, each member function definition must be tied to the cl
jenyasd209 [6]

Answer:

Binary Scope Resolution Operator

Explanation:

The :: (scope resolution) operator is used to get hidden names due to variable scopes so that you can still use them. The scope resolution operator can be used as both unary and binary. Fortunately, in this context we're not dealing with hidden contents; thus the Binary applies better than the Unary.

Cheers

5 0
3 years ago
What actions are considered positive body language?
Ainat [17]

Answer:

Greeting with a smile, open handed gestures, and making eye contact

Explanation:

I used this on E2020 and got it right

5 0
3 years ago
Other questions:
  • When are numbered lists generally used?
    14·2 answers
  • An effectively distributed resume will get an interview
    12·2 answers
  • Select the correct answer.
    15·1 answer
  • Write an original idiom that uses the word dog or dogs im in 4th
    5·2 answers
  • The larger the Word Size of a computer
    6·1 answer
  • A wide variety of "apps" are available to customize devices. Which category of app does word processing software fall into? Ente
    6·1 answer
  • What is the difference between web and internet ?
    10·1 answer
  • Can you be my friend plz
    9·1 answer
  • Tech A says that gasoline vapors are lighter than air, so inspection pits do not have a fire hazard like above ground hoists. Te
    9·1 answer
  • Write an application that determines whether the first two files are located in the same folder as the third one. The program sh
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!