1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ymorist [56]
3 years ago
10

The display in D1 should read Colin McCain what text function should be used

Computers and Technology
1 answer:
Kaylis [27]3 years ago
8 0

Answer:

The answer is "SUBSTITUTE(D1,"c","C",1)"

Explanation:

In the given question, some information is missing, that is an option so, the correct option can be described as follows:  

  • Many of us use the Bulletin feature, which is available in MS-Excel.  In these function the SUBSTITUTE is a method, that is used in Builtin to aim the functions to locate a string or character and to replace with the selected module.  
  • In the case of the end-user, it would like to replace "c" with a capital letter "C." And displays cell shifts in D1. This method uses 4 parameters, in which first describes cell reference, second string to located, third replacing string, and fourth its length.
You might be interested in
Why computer known as tool of information​
S_A_V [24]

Answer:

because it has the ability to capture the whole information you need or downloaded

8 0
2 years ago
Discuss in detail why you need to use a write blocker (either hardware or software) in your examinations, whether for a criminal
dolphi86 [110]

A write blocker is any tool that permits read-only access to data storage devices without compromising the integrity of the data. A write blocker, when used properly, can guarantee the protection of the data chain of custody. NIST‘s general write blocking requirements hold that:

<span>The tool shall not allow a protected drive to be changed.The tool shall not prevent obtaining any information from or about any drive.<span>The tool shall not prevent any operations to a drive that is not protected.</span></span>
8 0
3 years ago
For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used
qaws [65]

Answer:

These technologies are: Dual Stack Routers, Tunneling, and NAT Protocol Translation.

Explanation:

Dual Stack Routers -  This is the process in which a router’s interface is attached with IPv4 and IPv6 addresses

Tunneling -Tunneling is used as a medium to help the different IP versions  communicate with the transit network.

NAT Protocol Translation -  This helps the IPv4 and IPv6 networks communicate with each other since they do not understand the IP addresses of each other since, they are different IP versions.

3 0
3 years ago
Write pseudo code that performs the following: Ask a user to enter a number. If the
CaHeK987 [17]
Answer:
BEGIN
INPUT N
IF N>0 AND N<10 THEN
OUTPUT "blue"
ELSE
IF N>10 AND N<20 THEN
OUTPUT "red"
ELSE
IF N>20 AND N<30 THEN
OUTPUT "green"
ELSE
OUTPUT "It is not a correct color option"
ENDIF
END.

Explanation:

3 0
2 years ago
What is the definition of Graphic AIDS?.
V125BC [204]

Any image that helps you, the reader, understand the text that the visual aid is accompanied with is referred to as a visual graphic or graphic aid.

Too frequently, readers lazily scan or entirely ignore graphs, diagrams, charts, and tables. Grid graphs, tables, bar charts, flow charts, maps, pie diagrams, and drawings and sketches are the most popular. Relationships are displayed using grid graphs. A visual aid should always be used in conjunction with preparation to interest the audience, improve their comprehension of your message, elicit an emotional response, and assist you in communicating it effectively. Charts, diagrams, graphs, maps, flashcards, posters, images, photos, booklets, folders, pamphlets, cartoons, and comics are examples of graphic aids.

Learn more about graphic here-

brainly.com/question/1169945

#SPJ4

5 0
1 year ago
Other questions:
  • You are configuring IP settings on a new network. For the external interfaces, you decide to obtain registered IP addresses from
    5·1 answer
  • Can someone please give me example of three types of loop in pascal (It has to has randomize in it too)
    15·1 answer
  • True or false? Colons are required when entering the MAC address into the Reservation window?
    14·1 answer
  • int temp; temp = 180; if ( temp &gt; 90 ) { System.out.println( "This porridge is too hot." ); // cool down temp = temp – ( temp
    9·1 answer
  • c724 wgu True or false. A storage device consists of all the components that work together to process data into useful informati
    10·1 answer
  • Consider the following method:
    14·1 answer
  • How does the system work for this:
    15·2 answers
  • Make this be a 7th grade argument over a boy
    5·2 answers
  • What plan can businesses use to protect sensitive data from malicious attacks?
    11·2 answers
  • 8.1.4: Ghost Invasion!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!