1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
12

Shortcuts will help you complete spreadsheet tasks more efficiently.

Computers and Technology
1 answer:
max2010maxim [7]3 years ago
3 0
Ctrl(control) + s = save
Tab = auto complete formula
ctrl +c =copy'
ctrl+v = paste
ctrl +z = undo

you can also drag your formula down different cells

You might be interested in
Convert ⅖ pie radian to degree​
aniked [119]

Answer:

Convert to a decimal.

22.9183118°

Explanation:

7 0
3 years ago
Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 or 95) go north/south, and events (like the 10 or 90
Norma-Jean [14]

Answer:

The C code for the problem is given below

Explanation:

#include <stdio.h>

int main() {

   int highwayNumber;

   int primaryNumber;

   scanf("%d", &highwayNumber);

   if (highwayNumber >= 1 && highwayNumber <= 999) {

       if (highwayNumber <= 99) {

           if (highwayNumber % 2 == 0) {

               printf("I-%d is primary, going east/west.\n", highwayNumber);

           } else {

               printf("I-%d is primary, going north/south.\n", highwayNumber);

           }

       } else {

           primaryNumber = highwayNumber;

           highwayNumber %= 100;

           if (highwayNumber % 2 == 0) {

               printf("I-%d is auxiliary, serving the I-%d, going east/west.\n", primaryNumber, highwayNumber);

           } else {

               printf("I-%d is auxiliary, serving the I-%d, going north/south.\n", primaryNumber, highwayNumber);

           }

       }

   } else {

       printf("%d is not a valid interstate highway number.\n", highwayNumber);

   }

   return 0;

}

4 0
3 years ago
Read 2 more answers
If you were programming a robot to respond to touch, the path might look something like this:
aniked [119]

Answer:

what

Explanation:

5 0
3 years ago
Read 2 more answers
This question is related to linked-list representation of disjoint sets. Consider two sets Sx and Sy that have 3 and 5 elements,
sattari [20]

Answer:

A union (UNION(x,y)) of the sets Sx and Sy represented by x and y, respectively will perform ________4_________ update(s) of the attribute.

Explanation:

The UNION (x, y) disjoint-set data structure unites the dynamic sets that contain x and y, say Sx and Sy, into a new set.  It is called the union of the two sets. Before the union operation, the two sets are disjoint.  After the union operation, the representative of the resulting set is some member of Sx and Sy or either Sx or Sy. The sets Sx and Sy are then destroyed to remove them from the union collection S.  So, four operations are required.

8 0
3 years ago
A computer's CPU and hard drive are found in the
Galina-37 [17]
A computers CPU and the hard drive are found in the system unit. The correct answer is C. <span />
8 0
3 years ago
Read 2 more answers
Other questions:
  • What is a Web application?
    12·1 answer
  • Fullsoft, Inc. is a software development company based in New York City. Fullsoft’s software product development code is kept co
    10·1 answer
  • How are the internet and the World Wide Web different from each other
    14·1 answer
  • The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
    7·1 answer
  • Write a program that inputs a time from the console. The time should be in the format "HH:MM AM" or "HH:MM PM". Hours may be one
    6·1 answer
  • Explain the developments RAM since it was created in 1968 til today.
    7·1 answer
  • Over the past year alone, more than _________ have been stolen from Target.
    10·2 answers
  • Cuántos tipos de grua existen en el mundo​
    7·1 answer
  • An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
    9·1 answer
  • What is a gamer?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!