1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elodia [21]
3 years ago
9

Darren wants to substitute every occurence of the word bulky in his spreadsheet with the word strong. Which of these options sho

uld he use?Select one of the options below as your answer: A. Replace B. Find All C. Replace All
Computers and Technology
1 answer:
marin [14]3 years ago
6 0
If Darren wants to substitute every occurrence of the word bulky in his spreadsheet with the word strong, the one that he should use is the Find all function. This function simplifies the use of the Find method. Therefore, the correct answer would be option B. 
You might be interested in
Which of the following is true about strings?
pickupchik [31]

Answer:

Your answer is option C, or the third option.

They do not let the user type in letters, numbers, and words.

Explanation:

Strings are defined as a sequence of characters literal, constant, or variable. These sequences are like an array of data or list of code that represents a structure. Formally in a language, this includes a finite(limited) set of symbols derived from an alphabet. These characters are generallu given a maximum of one byte of data each character. In longer languages like japanese, chinese, or korean, they exceed the 256 character limit of an 8 bit byte per character encoding because of the complexity of the logogram(character representing a morpheme((which is the simpliest morphological(form or structure) unit of language with meaning)) character with 8 bit (1 byte, these are units of data) refers to cpu(central processing unit) which is the main part of a computer that processes instructions, and sends signals.

5 0
3 years ago
What two features distinguished Windows 2.0 from Windows 1.0?
zysi [14]
This question is a bit ambiguous as there were a few features that were added and any could be perceived as distinguishing depending on what you look for in your OS. I do believe this is in reference to the Wikipedia article on Windows 2.0 though as the first two listed features make note of Windows 1.0 specifically, therefore:

Windows 2.0 allowed windows to overlap, Windows 1.0 could not do this.

Windows 2.0 introduced new and more complex keyboard shortcuts and terminology such as "Minimize" and "Maximize" vs. Window 1.0's "Iconize" and "Zoom"

Source: https://en.m.wikipedia.org/wiki/Windows_2.0
5 0
3 years ago
Linux - Ubuntu 16.4:
babymother [125]

I believe you have to install locate with "sudo apt-get install locate" and type "locate 'filename'"

6 0
3 years ago
O A self-confident person knows that:
arlik [135]
C you should believe in yourself and your abilities
3 0
3 years ago
When processing all the elements of row i of a two-dimensional array named grades using a for loop with variable j, what is the
kykrilka [37]

Answer:

D

Explanation:

Two dimensional array contain both rows and columns. Each row represented one record and each column represent one filed in that record.

for ex: int grades[5][3];

here array grades contains 5 rows and in each row we have 3 columns

if we have grades[i][j] then " i " represents number of rows and j represents the number of columns in that row.

j<grades[i].length represents i=0 to 2[here no of columns are 3, array index starts from 0 to 2]

The Answer is D

8 0
3 years ago
Other questions:
  • What color model should Joe use if he will be using an offset printing press?
    7·1 answer
  • Suppose your name was Alan Turing. Write a statement that would print your last name, followed by a comma, followed by a space a
    10·1 answer
  • Please help me complete this task for ICT! Its about Hardware and Software
    12·1 answer
  • Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or
    5·1 answer
  • How many bits are required to encode an image that is 25 pixels wide and 50 pixels tall, if you encode each pixel with 12 bits o
    15·1 answer
  • 12While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The change
    5·1 answer
  • ________ of Willa Catha present an unadorned picture oflife on the prairies of the Midwestern United States during the19th centu
    8·1 answer
  • Cable Internet access can be described with which feature?
    5·2 answers
  • You are planning to write a guessing game program where the user will guess an integer between one and 20. Put the commented ste
    12·1 answer
  • I need subscribers plz ​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!