1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
10

Select the correct answer from each drop-down menu.

Computers and Technology
1 answer:
pychu [463]3 years ago
8 0

Answer#1

1. Conditional Formatting

Explanation:

we can follow these steps for conditional formatting

first of all Select those cells which needs formatting

after that  click on  Home tab then click on Conditional Formatting tab then click on New Rule button

after that a formatting rule dialog will be open just  click on Use a formula to determine which cells to format.

Under Format values where this formula is true, type the formula that  is to beedited

then finally Click on Format button

Answer#2

2. Nested IF

Explanation:

nested if is basically defined as a thing that is nested and is fully contained within something else of the same kind.

You might be interested in
A(n) __________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within anothe
Hitman42 [59]
<span>Virtual Private Network employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the internet.Tunneling protocol allows a network user to access or provide a network service that the underlying network does not support or provide directly</span>
7 0
3 years ago
Main Difference between Excel and word application<br>programs​
Sloan [31]

Answer:

See explanation

Explanation:

Word documents are mainly for typing papers and documents. This is useful for writing a report or making a book.

Excel is for writing spreadsheets and doing math equations within the program. This is useful for having budget calculators and math equations.

Hope this helped!

4 0
3 years ago
You are making a game! The player tries to shoot an object and can hit or miss it. The player starts with 100 points, with a hit
Anni [7]

The program illustrates the use of loops and conditions.

Loops are used for repetitions, while conditions are used to make decisions

The game program in Python, where comments are used to explain each line is as follows:

#This initializes the point to 100

point = 100

#The following loop is repeated 4 times

for i in range(4):

   #This gets the current action

   action = input("Hit or Miss: ")

   #This following if statement calculates the point

   if action.lower() == "hit":

       point+=10

   else:

       point-=20

#This prints the calculated point

print(point)

Read more about loops and conditions at:

brainly.com/question/14284157

3 0
3 years ago
Which key on the keyboard may be used to ensure that a horizontal or vertical line is straight when adding a line to a form or r
Darya [45]
The answer to this would be the shift key. 
8 0
4 years ago
The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
gayaneshka [121]

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

5 0
3 years ago
Other questions:
  • An initialization expression may be omitted from the for loop if no initialization is required.
    15·1 answer
  • The home keys on the numeric keypad are?
    15·2 answers
  • What is the benefit to having the user interface integrated into the operating system? a) Power users prefer the added flexibili
    13·1 answer
  • Which of these tools can best be used as a self assessment for career planning purposes
    12·1 answer
  • What do the points on this website do?
    14·2 answers
  • If the Account Number field in a record always should display the three characters in the account number in uppercase, then the
    14·1 answer
  • What key do I use to start my presentation
    9·1 answer
  • A program is
    7·1 answer
  • Write a program to input 100 students marks and find the highest marks among the them​
    12·1 answer
  • ANSWER ASAP! 50 POINTS!!!!
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!