1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
4 years ago
9

What area contains the command used to customize the print options in microsoft excel?

Computers and Technology
1 answer:
Nezavi [6.7K]4 years ago
4 0
The answer is Page Layout Ribbon.  The <span>area contains the command used to customize the print options in microsoft excel is Page Layout Ribbon.</span>
You might be interested in
When users talk about font size,
koban [17]

Answer:

The answer is 10......

4 0
3 years ago
Read 2 more answers
Zara is typing the names of all the States in Pakistan. She has not numbered the list. Suggest her the way by which she can numb
Pavel [41]

Answer:

Following are the steps that Zara  is taking to numbered the list is given below .

Explanation:

  • Choose the names of the states to be numbered.
  • Choose the Insert menu bar option. After that click from there on the Bullets and Numbering option.
  • After that different lists will show representing the numbering in different ways.
  • Select the numbering type option that you'd like to implement, and press ok button on it .
  • Finally the names of the state of Pakistan is numbered .

7 0
3 years ago
Write a program that turns a 32-bit numeric value (e.g., 0xFFFFh) and converts it to a byte array such that it can be printed to
Evgesh-ka [11]

Answer:

The program is written below,

.386

.MODEL FLAT, stdcall

.STACK 4096

GetStdHandle PROTO, nStdHandle:DWORD

WriteConsoleA PROTO,

hConsoleOutput:DWORD, ; output handle

lpBuffer:PTR BYTE, ; pointer to buffer

nNumberOfCharsToWrite:DWORD, ; size of buffer

lpNumberOfCharsWritten:PTR DWORD, ; num bytes written

lpReserved:DWORD ; not used (NULL)

ExitProcess PROTO, dwExitCode:DWORD

.data

bytesWritten DWORD 0 ; for WriteConsoleA

stdHandle DWORD 0 ; for WriteConsoleA

s1 BYTE "Hello Universe", 13, 10, 0

lenS1 = ($ - s1)

.code

_main PROC

print:

; get STDOUT handle

push -11 ; request STD_OUTPUT_HANDLE (-11)

call GetStdHandle ; call WinAPI to get console handle

mov stdHandle, eax ; save stdHandle

push 0 ; reserved, push NULL

push OFFSET bytesWritten ; bytes written

mov eax, lenS1

push eax ; bytes to write

push OFFSET s1 ; string address

push stdHandle ; STD_OUPUT_HANDLE

call WriteConsoleA ; call win api to write text to console

done:

INVOKE ExitProcess, 0

_main ENDP

END

3 0
4 years ago
Show the dynamic and speculation execution for the following code
djyliett [7]

Answerf9,f10,fll

Explanation:

6 0
3 years ago
. Suppose: x = (1111 1111 1111 1111 1111 1111 1111 1100)2 y = (0011 1011 1001 1010 1000 1010 0000 0000)2 a. Is x bigger than y i
ahrayia [7]

Answer:

a. Using 32bit unsigned binary system, x is bigger than y

b. Using 32 bit signed system, x is not bigger than y.

Explanation:

a.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In an unsigned system all binary digits are used up as the magnitude bits;

First, we need to convert each number to decimal

x = 4294967292 (decimal)

y = 999983616 (decimal)

4294967292 is greater than 999983616

So, x is greater than y (in 32 bit unsigned binary system)

b.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In a signed system, the most significant bit is used as the signed bit, the remaining bits are used in representing the magnitude bits;

The most significant bit is always the first bit.

0 represents positive (+)

While

1 represents negative (-)

First we need to separate the most significant bit from the magnitude bits.

So x = 1 (111 1111 1111 1111 1111 1111 1111 1100)2

And y = 0 (011 1011 1001 1010 1000 1010 0000 0000)2

Then, we need to convert each number to decimal

x = -2147483644

y = +999983616

From the above, y is greater than x

4 0
3 years ago
Other questions:
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • Repetition learning rates are the same for everyone, so there is no need to find an activation and break pattern that works
    12·2 answers
  • which type of website would a business selling merchandise on the internet use? A person B information C commercial D social
    9·1 answer
  • this device can be used to type documents,send email,browse the internet,handle spreadsheets,do presentations,play games,and mor
    14·1 answer
  • A tax return preparer, routinely publishes a schedule of the fees she charges her clients. For how long must keep copies of the
    7·1 answer
  • Need help with Brainly!! Thanks in advance for sharing your thoughts or answering any of my questions on this. [][] Firstly, Bra
    14·1 answer
  • By recording where a hockey puck goes into a net, a goalie can...
    8·2 answers
  • Biosolids are used as a chemical free natural choice for fertilizing.
    5·1 answer
  • Https://www.bing.com/videos/search?q=dancing+aaron+smith+1+hour&amp;view=detail&amp;mid=C6C28AF3C0CEC1E4AEE3C6C28AF3C0CEC1E4AEE3
    14·1 answer
  • List how much hard disk capacity you recommend, and write a sentence explaining why.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!