1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nika2105 [10]
3 years ago
15

You are able to drag a cell to a new location by pointing to the cell border until the pointer displays a _______ arrow, and the

n dragging the cell to the new location. A. three-headed B. four-headed C. single D. double-headed
Computers and Technology
2 answers:
ivann1987 [24]3 years ago
7 0
I think its D, double-headed if I remember right. If this is brainiest can you mark it, please! I am trying to rank up. Thanks, hun!
zloy xaker [14]3 years ago
4 0
The answer is the option B. four-headed arrow.

The displayed arrow is similar to this, but smaller:
        ↑
    ←     →
        ↓

The four headed arrow appears as soon as you point the cell that you want to move.

To drag the cell (its content and format) to a new location you have to click on the left button of the mouse and move to the new location, where you want to move the cell. If the new location is empty, the cell is dragged as soon as you unclick the lef button.

If the new location is occupied the dialog box will ask you whether you want to replace the content.

You might be interested in
Mary is writing an article about the animal kingdom. She wants to place image below the text. Which menu should Mary choose for
marysya [2.9K]

The Wrap Text menu.

The positioning of text in Word is sometimes not lined up with the inserted picture. By default, when you insert an image or a picture, its layout is set to inline with text. To change that, double click on the picture and then click the Wrap Text option. A number of options will pop up with text graphics.


7 0
3 years ago
Read 2 more answers
Who all likes fortnite
Debora [2.8K]

Answer:

my brother

Explanation:

5 0
3 years ago
Read 2 more answers
Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a
alexandr1967 [171]

Answer:

..

Explanation:

i dont really know. I am just answering for the sake of points lol

8 0
3 years ago
A​ __________ is a commonly used tool for showing how the parts of a whole are distributed.
dsp73
A. (pie chart) - correct answer
7 0
3 years ago
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
3 years ago
Other questions:
  • By which method is heat transferred through a metal <br> spoon?
    9·2 answers
  • The work principle is not always true<br> T or F
    11·2 answers
  • While using the CLI on a Windows 10 64-bit computer with a single HDD and a single volume, you want to move from the current dir
    15·1 answer
  • Referential integrity states that:______.
    15·1 answer
  • Explain the components of Information System?​
    13·1 answer
  • Q: If a program is invoked with "python program.py -r input.dat output.dat", what are the elements of argv?
    10·1 answer
  • A user tells a help desk technician that their browser is displaying a message that a site can't be
    14·1 answer
  • 1. Fill in the blanks with appropriate word. 5°1-5 is a collection of raw unprocessed facts, figures, and symbols ​
    12·1 answer
  • In cells D6 through D8, enter formulas to calculate the values of the stocks. The formulas should multiply the number of shares
    11·1 answer
  • Cyber vulnerabilities to dod systems may include
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!