1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
3 years ago
10

Diane wants to maintain a record of percent change in sales from the year 2000 to the present year. She enters the values of per

cent change in sales and the total percentage change in sales through the years in a spreadsheet. Which tab on the Format Cells dialog box will enable her to display the total percentage symbol in the spreadsheet?
A.
Alignment
B.
Numbers
C.
Background
D.
Font
Computers and Technology
1 answer:
zloy xaker [14]3 years ago
7 0

The Answer Is B.) Numbers... Hope This Helps!

You might be interested in
A TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer, which appends another 160 bits of
Tatiana [17]

Answer:  2140 bits.

Explanation:

In order to traverse the first network, the Data Link Layer builds a frame, which adds a 24-bit header to the IP datagram, which has 1820 bits (1500 bits of TCP data + 160 bits of TCP Header + 160 bits of IP Header).

When the frame arrives to the router that interconnects the two networks, the network layer is informed that the MTU for the destination network, is 800 bits only.

So, as the maximum size for a frame in the destination network must be 800 bits (including the 24-bit header), the IP protocol must fragment the original 1820-bit datagram, in a way that any frame have at a maximum 800 bits.

So the IP datagram is fragmented in 3 datagrams, two of them with 760 bits each (600 from the TCP segment + 160 bits from the IP Header), and a last one, with 620 bits (460 bits from the TCP segment + 160 bits from the IP Header).

All the datagrams are completed adding the 24-bit header to build frames that traverse the destination network until they reach to the final destination.

After stripping the 24-bit header, the frames (that became datagrams), arrive to the network layer protocol, divided in 3 fragments, one of 620 bits and two of 760 bits, with a total of  2140 bits, which, once reassembled, will become the original 1500 bits + 160 bits header of the TCP segment, after stripping the IP headers.

6 0
3 years ago
How does having constraints placed on a design change the engineering process
Delvig [45]
Having constraints on a design will change the engineering process and the process will take a long time to finish. The process eats up time, quality and budget especially when it involves prototypes and the like. Some common constraints involve the design itself and the engineer. 
8 0
4 years ago
Read 2 more answers
Some request lists might cause the disk scheduler to act the same when the three different algorithms are run. Create a request
storchak [24]

Answer:

35, 25, 50, 75, 95

Explanation:

List of five track numbers that will cause all three algorithms to visit the same tracks in the same order are -

35

25

50

75

95

Please go to attachment for the diagram how these 5 tracks will be traversed by various algorithms.

All the algorithms traverse in the order 35 -> 25 -> 50 -> 75 -> 95

7 0
3 years ago
What are the steps to configure user information in a document?
Svetach [21]

Answer: Step 1: Navigate to the document library where you would like to enable a Document Information Panel. Step 2: From Ribbon, click on settings to navigate to Library settings Page. Step 3: In the library Settings, you have to update the setting of content type. Enable management of content type if not already done.

6 0
3 years ago
Read 2 more answers
List 2 steps you need to ensure that the heading appears in the table of contents
expeople1 [14]

Answer:

If you have used Heading styles in your document, creating an automatic table of contents is easy.

  • Place your cursor where you want your table of contents to be.
  • On the References Ribbon, in the Table of Contents Group, click on the arrow next to the Table of Contents icon, and select Custom Table of Contents.

Explanation:

https://guides.lib.umich.edu/c.php?g=283073&p=1886010

An automatic Table of Contents uses Styles to keep track of page numbers and section titles for you automatically. Microsoft Word can scan your document and find everything in the Heading 1 style and put that on the first level of your table of contents, put any Heading 2’s on the second level of your table of contents, and so on.

If you want an automatic table of contents you need apply the Heading 1 style to all of your chapter titles and front matter headings (e.g. “Dedication” and “Acknowledgements”).  All major headings within your chapters should be use the Heading 2 style.  All subheadings should use Heading 3, and so on.

If you have used Heading styles in your document, creating an automatic table of contents is easy.

Place your cursor where you want your table of contents to be.

On the References Ribbon, in the Table of Contents Group, click on the arrow next to the Table of Contents icon, and select Custom Table of Contents.

If you want to change the style of your table of contents (e.g. you want more space between the items on level 1 and level 2 of your table of contents, or you want all your level 1 items to be bold), click on the Modify button, select the TOC level you want to change, then click the Modify button to do so.

If you want to change which headings appear in your table of contents, you can do so by changing the number in the Show levels:

pulldown.

Click OK to insert your table of contents.

 

The table of contents is a snapshot of the headings and page numbers in your document, and does not automatically update itself as you make changes. At any time, you can update it by right-clicking on it and selecting Update field.  Notice that once the table of contents is in your document, it will turn gray if you click on it. This indicates that it is getting information from somewhere else.

4 0
3 years ago
Other questions:
  • Stan is looking at cloud computing options for his business needs. He wants a model that helps his business customers and client
    12·2 answers
  • An operating system is an example of which of the following
    13·1 answer
  • The it department is reporting that a company web server is receiving an abnormally high number of web page requests from differ
    13·1 answer
  • Which of the following patterns should be used for the delimiter to read one character at a time using a Scanner object's next m
    7·1 answer
  • Greg is the network administrator for a large stadium that hosts many events throughout the course of the year. They equip usher
    7·1 answer
  • Access-lists pose a logical problem which often has more than one solution. Can you think of a different set of rules or placeme
    8·1 answer
  • Ple Choice Worth 5 points)
    11·1 answer
  • Identify the programmer’s responsibility in maximizing the programs reliability by having awareness of the beneficial and harmfu
    8·1 answer
  • These are pictorial images displayed on a computer screen​
    8·1 answer
  • what is the worst-case big o running time for finding the maximum value in an array of size n by scanning from left to right and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!