1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
4 years ago
10

Jane sold many notebooks at her school fair and earned a good amount of cash. To keep a record, she entered all the cash values

in a spreadsheet, but she forgot to enter the dollar symbol beside each amount. What is the quickest way to enter the symbol beside each number?
Computers and Technology
1 answer:
pantera1 [17]4 years ago
6 0
Use tab key & shift+$
You might be interested in
Read the following scenario. How might Sarah correct successfully complete her task? To permanently remove a file from her compu
Mekhanik [1.2K]

I'd go with two answers.

A: To permanently remove a file from her computer, Sarah doubled-clicked on the My Computer icon and searched for her file under the “Uninstall or change a program” menu option.

Or

B: Empty the Recycle Bin.

This question is somewhat not clear. Why I went with the answers above is because I really do not know what kind of a file Sarah wants to permanently remove. You can permanently delete a program file installed in the computer by following the procedure in option A. The option above will take you to the control panel and you'll be able to select the program you'd want to permanently remove. If you had initially deleted a file like a picture or a document or anything else that you necessarily do not need, it will go to recycle bin. You can head over there and select the Empty the Recycle Bin option to permanently delete the file.

7 0
3 years ago
Type the correct answer in the box. Spell all words correctly. What measures should organizations implement so that confidential
miss Akunina [59]

Answer:

Proper Authentication is required. Not all the people should get all the data. If this is the case then you are definitely going to find that data protection is breached. We need to define each user's role as well as privileges clearly or else we are definitely going to suffer. Always ensure proper authentication.

Explanation:

We need to define each user's roles and privileges. And that can be done through Authentication and Authorization,

8 0
3 years ago
Explain the RISC and CISC architecture. Comparison of RISC and CISC in detail.
puteri [66]

Answer:RISC(reduced instruction set computer) is the computer used for low level operation by simple command splited into numerous instructions in single clock only and CISC(Complex instruction set computer) is the computer that performs the operation in single instruction.

RISC architecture has hardwired control unit,data cache unit,data path ,instruction cache and main memory as components .CISC architecture persist of  control unit,micro program control memory, cache, instruction and data path and main memory.

The differences between RISC and CISC are as follows:-

  • The instruction in RISC are less and and low complexes while CISC has several number of complex instruction.
  • The calculation done by RISC are precise and quick whereas CISC has slightly slow calculation processing.
  • The execution of RISC is faster as compared to CISC.
  • RISC uses hardware component for implementation of instruction because it does not persist its own memory and CISC implements instructions using its own memory unit .

6 0
3 years ago
Directions: Asba student of Contact Center Service, you already have an experience using different computer programs. Try to rem
ELEN [110]

Explanation:

can u suggest a title about quarantine

ex: My quarantine life

8 0
3 years ago
Read 2 more answers
_________ cloud offers the services to a limited and well defined number of parties
denpristay [2]

Answer:

Private

Explanation:

5 0
3 years ago
Other questions:
  • Explain the difference between true north and magnetic north.
    9·1 answer
  • Which of the following is most accurate?
    10·1 answer
  • What does t'challa actions reveal about his character( black panther movie)​
    6·1 answer
  • If, when asked for a date of birth, the user enters a future date, this error should be caught by a ________ check.
    8·1 answer
  • Imagine you are a toy designer. How would you use measuring, dimensions, volume, and surface area information to create your toy
    10·2 answers
  • Digital Sep <br> helps as reimagine outcomes true or false
    9·1 answer
  • What will be the results from running the following code?
    12·1 answer
  • (a) What is the meaning of word 'computer (b) Cive a reason for the evolution of computer (c) Write a weakness of a computer (d)
    14·1 answer
  • Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
    12·1 answer
  • Jennifer turns on her laptop and hears a series of beeps. What do they probably indicate?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!