1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jasenka [17]
4 years ago
9

If you want to adjust the width of a column manually, move your mouse over the _______ column boundary and click and drag until

the column is the size you want.
Computers and Technology
1 answer:
Luda [366]4 years ago
6 0

Answer:

The answer is "Right".

Explanation:

In computer science, editing is the primary activity, which is used by the users to handles graphics, tables, and other things. It can be divided into two types first is internal(default) and the second is manual.

  • In the manual editing, to edit the column of the table we just right click on the column.
  • It enables you to edit option, in which we edit column according to our desire.
You might be interested in
Which protocols are TCP/IP application layer protocols? (choose all that apply)
natita [175]

Answer:

Option(b) and Option(c) is the correct answer for the given question.

Explanation:

TCP stands for transmission control protocol, In the TCP protocol firstly it maintains the connection between the sender and the receiver. The receiver always gives an acknowledgment to the sender when it receives the information that's why TCP is reliable protocol it is found in TCP/IP application layer protocols    

UDP stands for user datagram protocol, In the UDP protocol, it does not maintain the connection between the sender and the receiver. The receiver does not give any acknowledgment to the sender that why UDP is not a reliable protocol . it is also found in the TCP/IP application layer protocols

  • In the option(a) IP is found in the network layer that why this option is incorrect.
  • In the option(d) FTP is found in the application layer thats why this option is incorrect .

Hence TCP and UDP are TCP/IP application layer protocols

5 0
3 years ago
Read 2 more answers
What is income?
s2008m [1.1K]
I think its D hope this help
5 0
3 years ago
Read 2 more answers
What tool can help discover and report computer errors and conflicts that occur when you first turn on a computer and before the
Morgarella [4.7K]

The answer is a POST Diagnostic Card.

Although not a necessity, a POST card can help discover and report computer errors and conflicts that occur when you first turn on a computer and before the operating system. To be able to understand how a POST card works, one needs to be very familiar with the BIOS. The power-on self test (POST) is a series of various tests performed by a computer when you turn it on. If you have any issues that conflicts with the operating system and prevents the computer from booting, you can install a POST card in the available expansion slots. This card will monitor the entire boot process and report errors in coded numbers on a small LED panel on the card.  

6 0
3 years ago
Noah's document was very plain and would not catch the readers' attention. Select each item below that would make
Umnica [9.8K]

Answer:

1,2,3

Explanation:

4 0
3 years ago
A rang check that could be use to validate... Date and time
lisov135 [29]

A range check is often used when a person works with data consisting of numbers, dates and times, or currency, ensuring that a number is within a specific range.

Explanation:

  • Range checks allow a person to set suitable boundaries.
  • An example of a range check is checking to see if the value of a 16-bit integer is within the capacity of a 16-bit integer. When a range check is performed, upper and lower boundaries are specified.
  • Range check is a validation check which can be applied to numeric fields. This is done to ensure that only numbers within a certain domain can be entered into a field. Remember that this does not necessarily mean that the data entered will be correct. But it will certainly lie within reasonable limits.
  • A method of validation which checks that data falls between an upper and lower acceptable value.
  • This validation check which can be applied to numeric fields. This is done to ensure that only numbers within a certain domain can be entered into a field. Remember that this does not necessarily mean that the data entered will be correct. But it will certainly lie within reasonable limits.
5 0
3 years ago
Other questions:
  • Christine wants to send a quick communication to all department managers. She should send a _____. report
    13·2 answers
  • Write the method public static doublell quizAverages (double (1 scores). which takes a 2D array of doubles that represent quiz s
    11·1 answer
  • How many arguments are required for the sum function?
    15·1 answer
  • How do you record yourself on a macbook pro
    9·1 answer
  • How to wire two separate switches & lights using the same power source?
    14·1 answer
  • Television, radio, newspapers, magazines, the Internet, and other forms of communication are collectively referred to as thea. W
    15·1 answer
  • Consider the following program where the zu format specifier is used to display as an integer the result of sizeof. #include #in
    11·1 answer
  • The area of a rectangle is the rectangle's length times its width.
    5·1 answer
  • A swimming pool has a length of 28 feet, a width of 17 feet, and a depth of 6 feet. How much water can the swimming pool hold?
    10·1 answer
  • Active directory and 389 directory server are both compatible with which directory access protocol?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!