1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
3 years ago
6

Put the following five steps in the order in which you would perform them to use the Paste Special function. 1. Select and copy

a range. 2. Click the Paste button arrow in the Clipboard group on the HOME Tab. 3. Specify exactly what you want to paste. 4. Click Paste Special to open the dialog box. 5. Select the range where you want to paste the Clipboard contents.
Computers and Technology
1 answer:
Ivanshal [37]3 years ago
3 0

Answer:

The order to use the Paste Special function is 1, 5, 2, 4, 3

Explanation:

The Paste Special function is used to copy the contents of the cell without the properties of that cell.

For example, if a cell contains the text "my room" and it is colored pink, and also has a background color of black and other properties, and you want to copy just the text to another cell, copying and pasting normally (that is, using Ctrl + C and Ctrl + V or clicking copy and paste from the home tab) will copy and paste the cell with its properties, but to copy just the text, you need to use the Paste Special function.

To use the Paste special function in Microsoft Excel:

  1. Select and copy a range
  2. Select the range where you want to paste the Clipboard contents
  3. Click the Paste button arrow in the Clipboard group on the HOME tab
  4. Click Paste Special to open the dialog box, and
  5. Specify exactly what you want to paste.
You might be interested in
Question # 4
bezimeni [28]

Answer:

the last one I think not 100% sure

6 0
4 years ago
. A search engine is a way to
Sindrei [870]
<span>Option A, the search engine is the way to get information on the internet through a web browser, installed on an operating system of a computer. It is software that gathers all the information and stores it to accelerate the search for the users by entering the data of the desired information.</span>
8 0
4 years ago
Read 2 more answers
Is this a scam pls tell me????????????/
zloy xaker [14]

Yes don't trust at all, I've got that so many times

3 0
4 years ago
Read 2 more answers
Cryptography has requirements include:
ki77a [65]

Answer:

A

Explanation:

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. ... When transmitting electronic data, the most common use of cryptography is to encrypt and decrypt email and other plain-text messages.

4 0
3 years ago
Write a recursive method called permut that accepts two integers n and r as parameters and returns the number of unique permutat
tangare [24]

Answer:

Following are the code to the given question:

public class Main//defining a class Main

{

static int permut(int n, int r)//defining a method permut that holds two variable

{

return fact(n)/fact(n-r);//use return keyword to return calcuate value

}

static int fact(int n)//defining a fact method as recursive to calculate factorials

{

return n==0?1:n*fact(n-1);//calling the method recursively

}

public static void main(String[] abs)//main function

{

//int n=7,r=4;//defining integer variable

System.out.println(permut(7,4));//use print method to call permut method and print its values

}

}

Output:

840

Explanation:

Following is the explanation for the above code.

  • Defining a class Main.
  • Inside the class two methods, "permut and fact" were defined, in which the "permut" accepts two values for calculating its permutated value, and the fact is used for calculates factorial values recursively.
  • At the last, the main method is declared, which uses the print method to call "permut" and prints its return values.
8 0
3 years ago
Other questions:
  • You can create user accounts on the linux system by using the ____ command.
    9·1 answer
  • 4. How does distance affect the strength of the force of gravity?_
    5·1 answer
  • How can a user view the options for Junk E-mail?
    11·2 answers
  • If x window system is installed, linux users can use x11 forwarding to run __________ as they would on a windows computer. gui a
    11·1 answer
  • Steve adds a second 1-GB 240-pin DIMM to his PC, which should bring the total RAM in the system up to 2 GB. The PC has an Intel
    14·1 answer
  • Does anyone know about ICT? i need help ASAP
    9·1 answer
  • Which control program flow options runs to the end of the code block and resumes the break mode at the statement that follows?
    12·1 answer
  • You've adjusted your bicycle seat so it's centimeters from the ground how high should your handlebars be
    10·2 answers
  • How much time does a computer take to big calculations ?​
    15·1 answer
  • A coworker is taking a computer overseas and asks you what concerns he should have. What do you tell him
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!