1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
3 years ago
12

Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the

mistake?
Computers and Technology
1 answer:
erastova [34]3 years ago
8 0

If Seneca has not done anything since the conditional formatting she can undo what her last action was. This is done by either pressing control+Z or by clicking on the undo icon.

If other actions have been done, there are a few more steps that need to be taken in order to clear the formatting. They are:

1. Select the cell or cells whose formatting you want to delete.

2. Display the Home tab of the ribbon.

3. In the Editing group, click Clear | Clear Formats.

You might be interested in
Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
maxonik [38]

Answer:

IF Condition lol

Explanation:

3 0
3 years ago
What is the difference between requirements and controls in the security process? Give examples of each.
konstantin123 [22]

Answer:

Security controls are those measures taken to prevent, identify, counteract, and reduce security risks to computer systems, whereas, Security Requirements are guidelines or frameworks that stipulates measures to ensure security control.

Explanation:

Security controls encompass all the proactive measures taken to prevent a breach of the computer system by attackers. Security requirements are those security principles that need to be attained by a system before it can be certified as safe to use.

Security controls are of three types namely, management, operational, and technical controls. Examples of technical controls are firewalls and user authentication systems. A statement like 'The system shall apply load balancing', is a security requirement with an emphasis on availability.

4 0
3 years ago
In one paragraph summarize the history of the internet
ozzi

From 1982 to 1987 Bob Kahn and Vint Cerf are key members of a team which creates TCP/IP, the common language of all Internet computers. For the first time the it seemed as though the loose collection of networks which made up the ARPANET is seen as an “internet”, and the Internet as we know it today is born.

Explanation:

5 0
4 years ago
when you enter a formula in a cell the result of the calculation displays in a cell. how do views of formula after entering it?
Vika [28.1K]

<u>Answer:</u>

Any formula entered in the excel sheet should begin with “=”. Otherwise excel reads that to be a normal text and it will not process the further to get a “result”.

A formula can be entered either in <em>the cell or in the “formula bar”</em>. Once a formula is entered and an enter key is encountered, the result will be displayed in the <em>cell and connected formula</em> gets displayed in the Formula bar.

When we move the focus over that cell it <em>displays only content and not formula,</em> because formula gets displayed only in the “formula bar”.

7 0
4 years ago
Assume that cell F5 to F10 In a spreadsheet contains numeric value of salary earned by some workers and cell F12 contains the va
snow_tiger [21]

Answer:

=F5*$F$12+F5

Explanation:

If we want to increment the salaries in the cell F5, we must multiply the cell F5 by cell F12, and then we must sum that result.

If we want to drag the formula from the cell F5 to F10, we must use the dollar symbol $ to apply the same percent in our formula.

For example:

F12 = 5% = 0.05

F5 = 10,000

=F5*$F$12+F5

=10,000×0.05+10,000 = 10,500

5 0
3 years ago
Other questions:
  • On the home ribbon, what do you use to change the font size of characters in a cell
    9·1 answer
  • Victor has been murdered, and Art, Bob, and Carl are suspects. Art says he did not do it. He says that Bob was the victim's frie
    14·1 answer
  • What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?
    11·1 answer
  • You are using a new release of an application software package. You think that you have discovered a bug. Outline the approach t
    14·1 answer
  • Assume there is a variable, h that has already been assigned a positive integer value. Write the code necessary to compute the s
    9·1 answer
  • A filter is a camera accessory that is mounted on the optical path of the lens.<br> true or false
    6·2 answers
  • Write a function findWithinThreshold that identifies the elements of a given array that are inside a threshold value. Takes the
    13·1 answer
  • Assume that you have implemented a sequence class. Describe the mySequence object (i.e., items with the correct order and the po
    9·1 answer
  • If you’d like to have multiple italicized words in your document, how would you change the font of each of these words
    13·1 answer
  • Kyle has a notebook for each of his 5 classes. He puts 6 stickers on each notebook. There are 10 stickers on each sheet. How man
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!