1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
4 years ago
5

Janith is creating a spreadsheet with the names, locations, dates, and costs of summer camps she is interested in attending. Wha

t is the most efficient way to also add pictures, camper reviews, staff information, activity schedules, and menus?
Computers and Technology
2 answers:
Sholpan [36]4 years ago
5 0
The easiest way would be to add a column with the page link or add more columns for the extra data.
Anarel [89]4 years ago
5 0

Answer:

<u>Hyperlink camp’s web page.</u>

Explanation:

Considering all the changes Janith wants to make to the document, the most effective way is to add hyperlinks from the web page in excel. Adding a spreadsheet or even a column to your document may not be the ideal way to add images or to meet your needs, so by adding a hyperlink to the excel webpage, you are assured of better images and the ability to update content as needed. , and the customer can view at the same time.

You might be interested in
How can you use Word in order to edit and print documents ?
AleksandrR [38]

Answer:

in word, you go to the File tab on a document, then click print, or enter the keyboard shortcut: ctrl+p

to edit a downloaded document, open the document, and on the top of the document, click "enable editing"

Explanation:

hope this helps!

4 0
3 years ago
Hey can you help we with this thanks
dimulka [17.4K]
Hey, it's easy, come on!
6 0
3 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Disuss the roles of hardware,software and databases in regard to computer based information systems
forsale [732]

Explanation:

Data bases; interpretation and presentation of data in useful formats by transforming raw data into information, data storage management.

Hardware: helps to get to the physical and tangible part of computer.

Software; helps to access the word processor, spreadsheet's and social media platforms and general operations in a computer.

6 0
3 years ago
Which statement best describes the purpose of the Insert Function dialog box?
ryzh [129]

Answer:

It is used to insert a specific function by selecting it from the Insert Function list.

Explanation:

The insert function list various functions, and we can insert a specific function through a selection of one of the options from the insert function list. And it is certainly not used to display the information according to arguments used in the function, and which is quite clear. Also, it is used to put each type of excel functions in a certain order. And it is also not used to search for any specific functions through any keyword and description. Hence, the correct option is the second option.

3 0
3 years ago
Other questions:
  • Which type of network medium is used by an integrated services digital network adapter?
    14·1 answer
  • The numbers on the bottom of a typical check represent all of the following EXCEPT?
    12·2 answers
  • Write the definition of a class Clock. The class has no constructors and three instance variables. One is of type int called hou
    12·1 answer
  • Write a program that asks the user for several days' temperatures and computes the average temperature for that period and how m
    9·1 answer
  • It is always safe to enter personal information into a pop-up window. true or false.
    13·1 answer
  • Switched backbone networks:_____.a. always use a ring topology.b. require much more management that do routed backbone networks.
    10·1 answer
  • Select the correct answer. Which symbol denotes markup tags? A. {} B. &lt; &gt;. C. ( ) OD. [] ​
    7·1 answer
  • PLEASE HELP ME ASAP ITS IMPORTANT
    8·2 answers
  • Name at least 3 different portable computer devices that can be purchased
    15·2 answers
  • I WILL MARK BRAINLEST
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!