1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
3 years ago
10

When working in Excel Online, what is it called when you drag the fill handle down to copy data?

Computers and Technology
2 answers:
SVEN [57.7K]3 years ago
5 0
It’s called drag fill
Harrizon [31]3 years ago
5 0

Auto fill option is a unique feature which has fill handle which is used to copy. Complete fill, Drag fill and Operation fill are irrelevant and not valid in this context.  

Autofill option has multiple features.

1. It copies data again and again for the selected cell

2. It can generate a sequence for the selected cell

3. It also copies formula, other formatting items along with the text. Even if one want to change after dragging the cell, then it is possible to do so.

You might be interested in
3) An algorithm has a run time of O(nk ) for some integer k. On an input of size 500, the algorithm takes 16 seconds to run. On
lukranit [14]

Answer:

The value of k is 4

Explanation:

Solution

Given that:

k = integer

Input size = 500

The algorithm takes a run of = 16 seconds

Input size = 750

The algorithm takes a run of = 81 seconds

Now,

We have to determine the value of k

The equation is shown below:

(500)^k /16 = (750) ^k /81

Thus

(750/500)^ k = 81/16

= (3/2)^k

=(3/2)^ 4

k is = 4

6 0
3 years ago
The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blo
nydimaria [60]

Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, Explanation:

4 0
3 years ago
Which of the following statements is true according to the code?
mihalych1998 [28]

Answer:

The #intro style applies to all paragraphs.

Explanation:

It is a class

A class applyies to all with that name

5 0
4 years ago
HELP!' Prompt<br> In a table, what is a field?
ser-zykov [4K]

Answer:

Fields are the components that provide structure for a table. In fact, you can't have a table without fields. ... Fields in a table store the same category of data in the same data type. For example, if you have a NAME field in a table of customers, the entries for this field are all customer names and are stored as text.

3 0
3 years ago
Which term was used to define the era of the Internet, when the web became a "platform" for user-generated input, as opposed to
Pachacha [2.7K]

Hello, The answer to your question is:-

<em><u>Option </u></em><em><u>"</u></em><em><u>Web </u></em><em><u>2</u></em><em><u>.</u></em><em><u>0</u></em><em><u>"</u></em>

<em><u>Reference and proof</u></em>:-

Web 2.0 refers to websites that emphasize <u>user-generated content</u>, ease of use, participatory culture and interoperability (i.e., compatible with other products, systems, and devices) for end users.

Hope it helps you...

Answered by Benjemin ☺️

✅

5 0
3 years ago
Other questions:
  • What is TCP/IP?
    13·1 answer
  • What are the major features of a successful ethics training program and communication systems? Think of an example of a company
    13·1 answer
  • An existing document that you use as a starting point for a new document; it opens a copy of itself, unnamed, and then you use t
    15·1 answer
  • Describe how the spoofing attack can affect multiple network layers (application, transport, network, and data link layers).
    14·1 answer
  • This isn't school wise but like.. I can't log into IMessage so I decided to try and log into FaceTime but thats not working. Cau
    7·1 answer
  • PLEASE HELP
    8·2 answers
  • Which tool is best used to test an electrical current for a power source?
    8·1 answer
  • A wireless networking technician has completed a survey of a wireless network and documented the detected signal strengths in va
    6·1 answer
  • . What is a destructor and what is its purpose?
    5·1 answer
  • Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a tic
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!