1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
7

How do I insert a row in between 1 and 2 in excel?

Computers and Technology
2 answers:
Nataly [62]3 years ago
8 0

Answer:

  • Highlight row 2(left click on the entire row), the press the shift, ctrl and + keys. This will insert a row between 1 and 2

or

  • After highlighting row 2 as stated above, right click and select insert. This puts a row between 1 and 2.

Explanation:

Excel has an array of rows (horizontal) and columns (vertical). The intersection of a row and a column gives a cell.

To Insert a row between 1 and 2 in excel, there are two options

  • Highlight row 2(left click on the entire row), the press the shift, ctrl and + keys. This will insert a row between 1 and 2
  • Alternatively, after highlighting row 2 as stated above, right click and select insert. This puts a row between 1 and 2.
Vlada [557]3 years ago
5 0
This link should help: https://uhasct.com/insert-an-empty-row-between-each-row-of-data-in-excel/
You might be interested in
What type of windows network model allows all the participants to be represented equally on the network with no single computer
noname [10]
The workgroup as a type of windows network model allows all the participants to be represented equally on the network with no single computer having authority or control over another. The workgroup is peer-to-peer local area network. 
Members of this network group can share files, printers, Internet connection.<span> and other local network resources.</span>
4 0
3 years ago
Each symbol of an octal number corresponds to 3 bits of a binary number. is it true or false​
grin007 [14]

Answer: True.

Explanation: It uses only the 3 bits to represent any digit in binary and easy to convert from octal to binary and then to vice-versa. Hope that helps

5 0
3 years ago
A start-up is expanding overseas and spends an excessive amount of time on recruiting and hiring activities, hindering its abili
leva [86]
HCM is a word for Human Capital Management
6 0
3 years ago
The timer is running in the up mode with a period of 800 cycles. Channel 1 engages the output mode (Set/Reset) and sets its regi
Soloha48 [4]

Answer:

Explanation:

Part a)

_______________ ____________ _____________ ___

TAR | /\ \/ /\ \/ /\

|//////////|____________|____________|_____________|__________|

0 600 800 600 800 600

PWM Duty Cycle = 200/800 = 25%

Part b)  

______________ _________________ _________ _________________

TAR | \/ /\ \/ /\ \/

|//////////|_________|_________________|__________| _______________|

0 600 800 600 800 600

PWM Duty Cycle = 600/800 = 75%

7 0
3 years ago
The last step on Kotter’s Eight-Step Change Model is to anchor the changes in corporate culture; to make anything stick, it must
m_a_m_a [10]

Answer:

Therefore, it is important to find opportunities to integrate security controls into day-to-day routines.

Do you believe this to be true- Yes.

In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture. Is this correct or incorrect? - Incorrect

Explanation:

Truly, it is important to find opportunities to integrate security controls into day-to-day routines, this is in order to minimize future security threats by formulating company-wide security policies and educating employees on daily risk prevention in their work routines. In the operational risk controls, vigilant monitoring of employees must be implemented in order to confirm that policies are followed and to deter insider threats from developing.

Flexing and developing policies as resources and priorities change is the key to operational risk controls.

These risk controls implementation in organizational security is not a one-time practice. Rather, it is a regular discipline that the best organizations continue to set and refine.

For better preparation of an organization towards mitigating security threats and adaptation to evolving organizational security needs, there must be a proactive integration of physical information and personnel security while keeping these risk controls in mind.

12. In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture - Incorrect.

When security policies are designed, the business perspectives and the organizational values that define the organization’s culture must be kept in mind.

An information security and risk management (ISRM) strategy provides an organization with a road map for information and information infrastructure protection with goals and objectives that ensure capabilities provided are adjusted to business goals and the organization’s risk profile. Traditionally, ISRM has been considered as an IT function and included in an organization’s IT strategic planning. As ISRM has emerged into a more critical element of business support activities, it now needs its own independent strategy to ensure its ability to appropriately support business goals and to mature and evolve effectively.

Hence, it is observed that both the Business Perspective and Organisational goals are taken into consideration while designing Security policies.

6 0
3 years ago
Other questions:
  • 4. Discuss the advantages and disadvantages of using the same system call interface for both files and devices. Why do you think
    5·1 answer
  • Image files are grouped into two categories: _____.
    5·1 answer
  • What does sampling accomplish? Choose all that
    11·1 answer
  • What is the importance of Mathematical Modeling in the field of bioinformatics.
    8·1 answer
  • Which of the following statements about electronic cover letters is true?
    14·2 answers
  • Which of the following is NOT one of the three basic structures used to solved logical problems?
    7·1 answer
  • 9. "मेरे तो गिरधर गोपाल, दूसरो ना कोई
    5·1 answer
  • Why do software managers have to be generalists with a range of skills, rather than simply technical specialists?
    14·1 answer
  • Program 3.Study the code carefully and write out the line where there is error, debug it and write out the correct code
    13·1 answer
  • Temperature converter. This program should prompt the user for two arguments, first a decimal number and second, a single letter
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!