1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulijaS [17]
4 years ago
6

Elsa has collated information for a meeting using Excel. Due to certain developments, some of the data in her worksheet is now r

edundant. She deletes three rows from her worksheet to reflect the developments. Which of the following will happen to the rest of the rows in the worksheet when Elsa deletes three rows?
A. ​There will be an empty space where the deleted rows were.B. ​The data from the rows will be shifted to rows at the bottom of the worksheet.C. ​The data from the rows will be shifted to the rows at the beginning of the worksheet.D. ​The remaining rows will shift up to take the place of the rows that were deleted.
Computers and Technology
1 answer:
xxTIMURxx [149]4 years ago
4 0

Answer: Option(d) is the correct option

Explanation:

Excel sheets are the spreadsheets which consists of rows and columns for arrangement and display of values.It is used for mathematical function and computation .

According to the question, as Elsa is performing deletion of three rows is done for development, other rows will tend to shift upwards and settle in the deleted row spaces accordingly as per arrangement.

  • Other options are incorrect because deleted rows will not be indicated through empty spaces,row data won't shift to bottom of sheet and neither shift of data will take place at the starting of sheet.
  • Thus the correct option is option(d).
You might be interested in
For each problem listed below, use the drop-down menu to select the field of the professional who can help solve the issue.
Paul [167]

Answer:

  • Interactive media
  • Information services and support
  • Programming and software development
  • Network systems administration

Explanation:

The company has finished designing a software program, but users aren’t sure how to use it. <u>interactive media</u>

Several people in the human resources department need new software installed. <u>information services and support</u>

An employee has an idea for a software program that can save the company time, but doesn’t know how to write it. <u> programming and software development</u>

A new branch of the company is opening soon, and the computers there need to be connected to the Internet. <u>network systems administration</u>

<u>OAmalOHopeO</u>

3 0
3 years ago
4. True or False: In order to use wi-fi signal/network, you have to remain seated in one spot.
gizmo_the_mogwai [7]

Answer:

4. flase

5. true

Explanation:

If your getting wifi signal on your phone right now while where running in your house or traveling through the kitchen, you don't have to sit in one spot.

I tried doing that with another phone but It didn't work... :(

5 0
3 years ago
What important advice to include about spyware, viruses and other types of malware
S_A_V [24]

Answer:

You should probably include the fact that most of these things will disguise themselves as fake downloads and that will most of the time claim to allow you to download something that costs money for free.

Explanation:

thats all i could come up with

5 0
2 years ago
Read 2 more answers
Program your own file lab7.cpp in which your main() function will test the new data structure. The main() function, Declares an
Stella [2.4K]
Is this a question or just something up here just to be here
3 0
3 years ago
Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an examp
laiz [17]

Is an example of reactive, signature based IDS/IPS

Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.


3 0
3 years ago
Read 2 more answers
Other questions:
  • Regulatory control limits the activities of an organization in compliance with the organization's policies. True False
    14·2 answers
  • Rachel completed typing an official docment with a word processing program. She wants to make sure that her document has no typo
    15·2 answers
  • In a relational database design, all relationships are expressed by ________.
    10·1 answer
  • What are the two main functions of user accounts in Active Directory? (Choose all that apply.) Allow users to access resources m
    7·2 answers
  • Suppose Host A sends Host B a TCP segment encapsulated in an IP datagram. When Host B receives the datagram, how does the networ
    11·1 answer
  • When you make a DNS query, where does your computer first check to find an IP address to name mapping?
    8·1 answer
  • How do you get a code in C to count down from 5??
    6·1 answer
  • Hey mates.........needed asap 1.) Mention and explain four (4) ICT gadgets,
    9·2 answers
  • What is the binary number 0011 0011 multiplied by two?
    11·1 answer
  • How do i unblock a website on a school computer if a school blocks it?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!