1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
3 years ago
9

You cannot change data directly in the PivotTable. Instead, you must edit the Excel table, and then ____, or update, the PivotTa

ble to reflect the updated data. a. change b. renew c. reset d. refresh
Computers and Technology
2 answers:
natulia [17]3 years ago
7 0

Answer:

D. Refresh.

Explanation:

Microsoft Excel is a spreadsheet application used to analyze data. It has rows and columns which are also known as records and field, use to locate cells in the worksheet.

The pivot table is a tool in excel created from a table. It has special analytic features normal excel table don't have. A data cell in the pivot table can not be edited direct on the pivot, but through the original table. The cell in the original table is edited and refreshed to update the pivot table to it's current state.

Fudgin [204]3 years ago
5 0

Answer:

d. refresh

Explanation:

The Excel software does not allow a user to change values/data directly in the Pivottable. You will get an error message like "Cannot change this part of a PivotTable report" when you try to type data directly.  You will have to edit the Excel Table and then refresh to reflect the updated data.

You might be interested in
A Windows systems administrator should use the Administrator account ________.a. As little as possible, and only when needed b.
torisob [31]

Answer:

a. As little as possible, and only when needed

Explanation:

6 0
3 years ago
______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
Kitty [74]

Answer:

"IP security" is the correct answer for the above question.

Explanation:

  • "IP security" is a set of rules or protocols which are used for the communication of the network.
  • It is a protocol that is used to encrypt the data which is needed to transfer on the network.
  • It provides security for the communication and it encrypts the data which is needs o transfer on the network.
  • The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.
7 0
4 years ago
Read 2 more answers
If classes C1 and C2 both implement an interface Cint, which has a method whichIsIt, and if C1 c = new C1( ); is performed at on
Assoli18 [71]

Answer:

FALSE

Explanation:

Because C1 and C2 implement the same interface, they both implement whichIsIt. The variable c is known as a polymorphic variable, meaning that it can change from being an C1 to a C2. So, the message c.whichIsIt( ); may invoke C1's whichIsIt or C2's whichIsIt. This can only be known at runtime.

5 0
3 years ago
A foreach statement can be used in place of the for statement whenever code looping through an array requires "access" to the co
Ede4ka [16]

Answer:

False

Explanation:

Foreach is useful when we want to do something for each element rather than repeating something for  n times

Answer is False

5 0
3 years ago
Which spreadsheet toolbar displays options such as Cut and Paste?
Colt1911 [192]
The answer would be ''Drawing Toolbar'' and you can find this inside your mouse area, where u click the right button (right side) and it shows a small chart/toolbar where it gives you the options to copy, cut, paste and more.
4 0
3 years ago
Other questions:
  • Define the method object inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids.Sample output for the g
    11·1 answer
  • • Two advertisers A and B
    8·1 answer
  • How do computer worms spread​
    11·1 answer
  • What is the name of the interface that uses graphics as compared to a command-driven interface?
    11·1 answer
  • this device can be used to type documents,send email,browse the internet,handle spreadsheets,do presentations,play games,and mor
    14·1 answer
  • “Artificial intelligence is the tool of education in the near future”. Research on the possibility of “AI technology” in scienti
    15·1 answer
  • Where is the quick access toolbar located?
    7·1 answer
  • 2. What is the first part of the 3D printing process ?
    11·1 answer
  • If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command
    12·1 answer
  • Combining data and code in a single object is known as
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!