1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis23 [38]
3 years ago
13

Which command suppresses the visibility of a particular row or column in a worksheet?

Computers and Technology
1 answer:
Gwar [14]3 years ago
8 0

Answer:

Hide command suppresses the visibility of a particular row or column in a worksheet

Explanation:

Hide command is used to hide the row or column in an excel worksheet. To suppress the visibility of a particular row or column in a worksheet, you have to select that particular row or column and then right-click on column or row header. A popup screen will appear as like when you refresh the computer. Then on this screen, at the bottom, you will find the hide command, click the hide command. And, as you click the hide command that particular row or column will become invisible. if you want to show it again, click the Unhide command. Therefore, hide command suppresses the visibility of a particular row or column.

Why other options are not correct

Autofit

Autofit command is used when you want that a particular cell of row or column to automatically adjust / or accommodate the content. Autofit command does not affect the visibility of a row or column.

Insert

Insert command is used to insert contents in a particular worksheet. Insert command is based on groups of various commands such as inserting tables, charts, graphs, text, symbols, add-ins, sparklines, and links.

Replace

Replace command is used in excel to replace the text with some other text. If you want to replace some text with some other text, then you have to use the replace command.

You might be interested in
What is the proper order for the fetch-execute cycle?
vesna_86 [32]

Control Unit – controls all parts of the computer system. It manages the four basic operations of the Fetch Execute Cycle as follows:

Fetch – gets the next program command from the computer’s memory

Decode – deciphers what the program is telling the computer to do

Execute – carries out the requested action

Store – saves the results to a Register or Memory

Arithmetic Logic Unit (ALU) – performs arithmetic and logical operations

Register – saves the most frequently used instructions and data

5 0
3 years ago
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
Mamont248 [21]

Answer: A. CRYPTO-MALWARE

Explanation: Crypto-malware is a type of ransomware that blocks the uses from accessing the computer system,it also encripts all the files.

This type of ransomware is mainly used to demand for ransom.

This type of ransomware which makes use of sophisticated and advanced ransomware technology to ensure that encripting must be with a unique Key or password,the hijacked system is used for crypto mining without the owns consent.

7 0
3 years ago
Read 2 more answers
Bulleted and Numbered List button appear in the ………….. Toolbar.​
stich3 [128]

Answer:

The answer to this question is given below in the explanation section

Explanation:

Bulleted and Numbered List button appear in the <u>Paragraph </u>Toolbar.​

On word processing software, these options display in paragraph toolbar in the Home ribbon.

for example, in MS Word, you can find them in the Home tab under paragraph groups of command.

however, it is noted that these options are appear in some other software under the formating toolbar.

8 0
3 years ago
What are the nine tasks (steps) you should perform prior to upgrading a computer to windows 7?
BARSIC [14]
I think those 9 tasks would be :

1. learns windows powershell
2. Plow through licensing
3. focus on strategic improvements
4. Expand the deployment scope
5. Prepare for distributed security
6. Virtualize your destkop
7. Evaluate enterprise features
8. Build compatibility safety nets
9. Remove your users' local admin rights
4 0
4 years ago
WILL GIVE 100 POINTS AND GIVE BRAINIEST TO THE FIRST PEOPLE THAT ANSWER CORRECTLY!!!!!! Marcus wants to create a spreadsheet wit
maks197457 [2]

Answer:

tell me bar

Explanation:

5 0
4 years ago
Read 2 more answers
Other questions:
  • You can decide if a paint booth filter is hazardous waste by answering which of the following questions: A) Is the paint residue
    12·2 answers
  • The operating system, and in particular the scheduler, is not an important component of a real-time system.
    14·1 answer
  • The process of providing and denying access to objects is called:
    5·1 answer
  • How can social media be useful for brand awareness ?
    14·1 answer
  • How would you compare and contrast the impact of the printing press with the impact of the internet?
    15·1 answer
  • which of the following uses technical and artistic skills to create visual products that communicate information to an audience?
    14·1 answer
  • The ____________________ utility uses the Burrows-Wheeler Block Sorting Huffman Coding algorithm when compressing files.a) bzip2
    11·1 answer
  • In this program we are going to practice using the Math class by computing some important values on the unit circle. Using the a
    5·1 answer
  • What the five types of initiatives that are necessary when putting together and implementing an IT strategy
    9·1 answer
  • Which of the four factors of production are hit the hardest when high unemployment occurs ?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!