1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
7

Activity

Computers and Technology
1 answer:
ch4aika [34]3 years ago
3 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about creating a table using a spreadsheet program to record how many t-shirt each team member sold.

The spreadsheet file is attached.    

Download xlsx
You might be interested in
Let f and g be two one-argument functions. The composition f after g is defined to be the function x 7→ f (g (x)). Define a proc
Ghella [55]

Answer and Explanation:

(define (compose f g)

(lambda (x) (f (g x))))

6 0
3 years ago
6. How can you encrypt an entire drive, including files and folders belonging to other users? a. EFS b. User Account Control c.
matrenka [14]

Answer:

A.

Explanation:

Encrypting File System (EFS) is a file system which enables you to encrypt files, thus making them unviewable by any account but your own.

6 0
3 years ago
What are the purpose of Keyframes,
Kobotan [32]

Answer:

In media production, a key frame or keyframe is a location on a timeline which marks the beginning or end of a transition. It holds special information that defines where a transition should start or stop. The intermediate frames are interpolated over time between those definitions to create the illusion of motion.

Explanation:

7 0
3 years ago
What is a feature of Print Preview
Leona [35]

Answer:

It shows you how the paper would look as if u printed it.

Explanation:

4 0
3 years ago
Read 2 more answers
Flujograma de nómina ​
balu736 [363]
Explanation there is the rest in comments

7 0
2 years ago
Other questions:
  • Once Google Analytics processes data, it’s stored in a database where it can’t be modified.
    9·1 answer
  • What is one of the differences between Random Access Memory (RAM) and Read Only Memory (ROM)? RAM is where files are stored, and
    6·2 answers
  • What is the first structure of a pascal program?
    5·1 answer
  • relational integrity constraints are rules that enforce basic and fundamental information-based constraints. True or False
    9·1 answer
  • Why did hockey champion Haley wickenheiser feel angry after the Bach said the IOC would make a decision in the next month?
    8·1 answer
  • What is difference between base font and font tags​
    13·1 answer
  • Order the steps to use a logical argument as a rule type.
    15·2 answers
  • What was software for modems that connected through phone lines called?
    6·1 answer
  • Use your editor to open the cc_data.js file and study the data stored in the staff object to become familiar with its contents a
    6·1 answer
  • Which of these is installed only on Apple smartphones and tablets?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!