1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmainna [20.7K]
3 years ago
12

You are working on an excel table and realize that you need to add a row to the middle of your table. what is one way to do this

? highlight the column, then click on the insert cells button under the home ribbon. highlight the cell, then click on the insert cells button under the home ribbon. highlight the row, then click on the insert cells button under the data ribbon. highlight the row, then click on the insert cells button under the home ribbon.
Computers and Technology
1 answer:
Tpy6a [65]3 years ago
4 0
Highlight the row, then click on the insert cells button under the home ribbon.
You might be interested in
CP/IP over Ethernet supports basic frames with a total size of up to 1518 bytes (including both the message payload and headers)
Ne4ueva [31]

Answer:

I think you just add all the Bytes together

6 0
3 years ago
Each device attached to your computer has a special program called a(n ________ that enables the device and operating system to
koban [17]
The answer is Device Driver
8 0
3 years ago
What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet
Luden [163]

Answer:

Explanation:

Asymmetric cryptography, is a cryptographic system that uses two different types of keys both public and private keys. Symmetric cryptography on the other hand uses the same type of key for both encryption. The benefit of using a combination when transferring data across the internet is that Asymmetrical cryptography is necessary to establish a secure connection while symmetrical cryptography can enhance the speed of the data transmission after connection has been established, thus both provide a unique benefit.

7 0
4 years ago
Complete the sentence with the correct response. In a two-way selection, if the initial statement is evaluated as , the code ski
mestny [16]

Answer:

True.

The code skips the else command

Explanation:

I will answer this question with the following code segment

<em>n = 1</em>

<em>If n > 0:</em>

<em>   Print("greater than 0")</em>

<em>else:</em>

<em>   Print("not greater than 0")</em>

<em />

From the code segment above

<em>Print("greater than 0")</em> will be executed because the condition <em>If n > 0 </em>is true

Since the if condition is true, the else condition will not be executed

8 0
3 years ago
A high-angle shot is the same thing as a bird’s-eye shot. True False
mariarad [96]
I believe that is false, but note I could be wrong.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program LotheryPrinter that picks a combination in a lottery. In this lottery, players can choose 6 numbers ( possibly r
    9·1 answer
  • In a transaction-processing system (tps), if the tps database can be queried and updated while the transaction is taking place,
    11·1 answer
  • A ____ is a collection of computers and users that are identified by a common security database. workgroup controller segment do
    7·1 answer
  • It is possible to turn extrinsic factors into intrinsic motivators. true or false
    5·2 answers
  • How could you insert a new row between rows 20 and 21?
    7·2 answers
  • What is the GCF of 48mn and 81mn??<br> O 3mn<br> O 3m?n<br> O 48mºn<br> O 129mn
    12·1 answer
  • A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department
    9·1 answer
  • How do you get a potion of fire-protection in the overworld because I am having a hard time in the Nether? I will give away 14 p
    8·2 answers
  • 16. What's the difference between a footnote and endnote?
    11·1 answer
  • Which of the following is not a valid Java identifier? a. Factorial, b. anExtremelyLongldentifierlfYouAskMe, c. 2ndLevel, d. Iev
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!