1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
4 years ago
9

If Denise specifies Jan? as a search criterion, Excel will locate all of the following records EXCEPT ____.

Computers and Technology
1 answer:
Harrizon [31]4 years ago
6 0
If Denise searches for the word "Jan" specifically in Excel, several other words will also come up in the search. Some of the words will be January, Janet, and most likely Jane. It does this so that the person only has to type in the first few letters of a name to find exactly what they are looking for. 
You might be interested in
What is an end user license (EULA) agreement an example of?
sattari [20]

Answer: a retailer

Explanation:

3 0
3 years ago
Read 2 more answers
Flowcharts allow you to more easily clarify among multiple potential solutions to a problem to see which solution is best.
timurjin [86]
Yes that is correct, but what is the question?
3 0
3 years ago
What computing platform was designed to help a beginner create interactive objects that receive input from sensors and use that
Arturiano [62]
The answer is <span>Arduino.  It is the </span>computing platform which was designed to help a beginner create interactive objects that receive input from sensors and use that input to control lights, motors, and other physical objects.  It<span> can be used to develop stand-alone interactive objects or can be connected to software on your computer.</span>
3 0
4 years ago
If the user enters 26 what is output? _____________
MArishka [77]

Please write the whole question, is it asking for the function that requests user input?

3 0
3 years ago
Give four example of computer virus​
asambeis [7]

trojan virus allows some one to sneak a bunch of coruppted data or more viruses into a system. a worm is able to access some ones computer and steal information a firebug is used to crash someones computer and spyder is used to scramble some ones work and deleting it

6 0
3 years ago
Other questions:
  • The chief architect now needs to design a memory with an addressability of 32 bits. Suppose the architect can only use the same
    6·1 answer
  • Dolphin Tecx is a new tech company that just issued smart watches to its
    9·1 answer
  • 14. What is the simplest way to permanently get rid of an unwanted file?
    9·1 answer
  • Which of the following is an object-oriented prototype-based language? Java Pike REBOL MATLAB
    9·1 answer
  • Assume that name has been declared suitably for storing names (like "Misha", "Emily" and "Sofia"). Assume also that stdin is a v
    6·1 answer
  • Cuando se introduce una fórmula en una celda primero que hay que introducir es
    13·1 answer
  • Which of the two do you think is the most secure mode of communicating: sending a letter using the postal service or sending an
    9·1 answer
  • What would be an ideal scenario for using edge computing solutions? a regional sales report uploaded to a central server once a
    14·1 answer
  • Which of the following is not an example of a cyber crime?
    8·1 answer
  • The Bellman-Ford algorithm for the shortest path problem with negative edge weights will report that there exists a negative cyc
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!