1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis23 [38]
4 years ago
13

Which command suppresses the visibility of a particular row or column in a worksheet?

Computers and Technology
1 answer:
Gwar [14]4 years ago
8 0

Answer:

Hide command suppresses the visibility of a particular row or column in a worksheet

Explanation:

Hide command is used to hide the row or column in an excel worksheet. To suppress the visibility of a particular row or column in a worksheet, you have to select that particular row or column and then right-click on column or row header. A popup screen will appear as like when you refresh the computer. Then on this screen, at the bottom, you will find the hide command, click the hide command. And, as you click the hide command that particular row or column will become invisible. if you want to show it again, click the Unhide command. Therefore, hide command suppresses the visibility of a particular row or column.

Why other options are not correct

Autofit

Autofit command is used when you want that a particular cell of row or column to automatically adjust / or accommodate the content. Autofit command does not affect the visibility of a row or column.

Insert

Insert command is used to insert contents in a particular worksheet. Insert command is based on groups of various commands such as inserting tables, charts, graphs, text, symbols, add-ins, sparklines, and links.

Replace

Replace command is used in excel to replace the text with some other text. If you want to replace some text with some other text, then you have to use the replace command.

You might be interested in
What do you think that private information like passwords, PIN numbers, will be guarded or shared with the public? Why?​
Salsk061 [2.6K]

Answer:

Explanation:

These will be shared with the public because websites like haveibeenpwned share what data leaks that your password has appeared on. It is inevitable that these hacks will continue to occur as long as security can be breached.

6 0
2 years ago
2.13.4 Colorful Caterpillarhel ????
exis [7]

Answer:

sorry don't know :(8685

3 0
3 years ago
What is another way to use the Help feature in Access 2016?
FinnZ [79.3K]

Answer:

I really don't know that 100% a question. But, Your answer will be C. Use the first command group under the Home tab to open a dialog box.​ Because, You got to use the first command group under screen computer. Then, You got use the click the help icon button that appears infront of the right interface. After that, If it shows a ok button press ok.

Um, Hope That Helps!!~

By Itsbrazts

4 0
3 years ago
Read 2 more answers
Which of the following is one way a corporation can raise money?
Vladimir [108]
Selling stock on the stock market
4 0
4 years ago
What is the most important basic property of melody? Why?​
enot [183]

Most good melodies restrict their basic range to no more than an octave-and-a-half. Most good melodies use repeating elements. Listeners should be hearing certain melodic intervals, rhythms and other musical shapes repeating throughout the melody

5 0
3 years ago
Other questions:
  • All of the following are good reasons to attend a cummunity college except
    10·2 answers
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers to the e
    9·1 answer
  • Your Economics teacher has asked you to create a chart showing how supply and demand affects the price of gasoline. Which applic
    11·1 answer
  • If Nancy receives an encrypted message from Matthew, which key does she use to read it? Nancy’s private key Nancy’s public key M
    8·1 answer
  • Which quality is likely to ensure consistent career growth in the computer field?
    9·2 answers
  • A(n) _________ is a formal access control methodology used to assign a level of confidentiality to an information asset and thus
    6·1 answer
  • When mehtod X calls method Y , method Y called methhod Z, and method Z calles method X, this is called
    9·1 answer
  • Would a sim card(activated) be able to function on any phone regardless of the companies carrier?
    7·1 answer
  • Some of the ways we can resolve IPv4 address shortage
    15·1 answer
  • In python,
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!