1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
7

How do I insert a row in between 1 and 2 in excel?

Computers and Technology
2 answers:
Nataly [62]3 years ago
8 0

Answer:

  • Highlight row 2(left click on the entire row), the press the shift, ctrl and + keys. This will insert a row between 1 and 2

or

  • After highlighting row 2 as stated above, right click and select insert. This puts a row between 1 and 2.

Explanation:

Excel has an array of rows (horizontal) and columns (vertical). The intersection of a row and a column gives a cell.

To Insert a row between 1 and 2 in excel, there are two options

  • Highlight row 2(left click on the entire row), the press the shift, ctrl and + keys. This will insert a row between 1 and 2
  • Alternatively, after highlighting row 2 as stated above, right click and select insert. This puts a row between 1 and 2.
Vlada [557]3 years ago
5 0
This link should help: https://uhasct.com/insert-an-empty-row-between-each-row-of-data-in-excel/
You might be interested in
Develop a program that will calculate the area and perimeter of a rectangle. The length and width can be given as constant.(LENG
o-na [289]

Answer:

#include <iostream>

using namespace std;

int main()

{

 

  int length = 8;

  int width = 8;

 

  int perimeter = 2*(length + width);

  int area = length * width;

 

  cout<<"The perimeter is "<<perimeter<<endl;

  cout<<"The area is "<<area<<endl;

 

  return 0;

}

Explanation:

include the library iostream for using the input/output instructions in the c++ programming.

Create the main function and define the variable length and width with values.

Then, use the formula for calculating the perimeter and area of rectangle.

perimeter = 2*(length + width)

area = length * width

and store in the variables and finally print the output.

8 0
3 years ago
On a DTP project, Morgan is preparing digital files to be sent to a printer. Which word describes the activity that Morgan is pe
VladimirAG [237]

In this activity Morgan is preparing the digital files to a printer  on a DTP project.

Explanation:

DTP project is the creation of documents using page layout on a personal computer. The process of printing digital based images directly to variety of media substrates is known as digital processing.

The digital files like PDFs can be sent directly to digital printing press to print on paper, photo paper, fabric and so on.

They have unique fade rates and different sensitives to the various deterioration mechanisms. DTP is used for graphic designers to create documents.

6 0
3 years ago
Read 2 more answers
Which amendment applies to the following scenario? “Brian attended church with his two daughters and wife on Sunday." A First B
iragen [17]

Answer: First Amendment

Explanation:

The First Amendment gives individuals the freedom of speech and the right to proactive any religion that they want. It also allows the people have a peaceful protest.

The swcud amendment gives people the right to keep arms. The Fourth hinders individuals from being searched without a warrant.

Therefore, the answer is First Amendment.

4 0
3 years ago
To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the syst
fgiga [73]

Answer:

The answer is "Option a".

Explanation:

Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.

The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".

5 0
3 years ago
Choose the missing method name.
leva [86]

Answer:

midpoint i'm pretty sure. :)

Explanation:

3 0
2 years ago
Other questions:
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
    12·1 answer
  • Which practice is the safest way to sit at a desk while typing on the computer?
    12·1 answer
  • Distinguish between exponentiation and modulus. Be specific.
    5·1 answer
  • By
    7·1 answer
  • Write a for loop that runs 5 times and accepts the input of an integer number every time. Those numbers will be accumulated by a
    7·1 answer
  • Choose the parts of the browser window. PLEASE ANSWER QUICKLY TEST
    12·2 answers
  • Note oj cyber security​
    6·1 answer
  • Hyperlink is a term used to refer to the specific manner of specifying the address of a website. Write reason for true or false.
    10·1 answer
  • Where did the name "QWERTY" come from?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!