1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepladder [879]
3 years ago
13

Lisa is modifying a spreadsheet. Which view will allow Lisa to see how her changes will look when she prints the spreadsheet?

Computers and Technology
2 answers:
Vlad1618 [11]3 years ago
7 0

Answer:

Print Preview allow Lisa to saw as it would appear when printed.

Explanation:

Print Preview is a feature that is used to display the current document as it would appear when printed. To saw preview  select worksheet and then clicking File> Print before print you will saw a preview or the shortcut key for print preview is ctrl+F2. Print Preview is also used to check page margins header footers lines etc. In spread sheet un border cell are not show in Print preview or in Print.

irina1246 [14]3 years ago
6 0

Answer:

Page Layout.

Explanation:

<em><u>Page Layout </u></em>will enable her to see how her changes will look when she prints the spreadsheet.

Hope this helps! <em><u>Stay awesome.</u></em>

You might be interested in
Which utilities are excellent examples of connectivity software, applications that enable you to determine if a connection can b
enyata [817]

Answer:

Connectivity Ping and traceroute are two utilities that are really good illustrations of connectivity applications that enable us to determine.

<h3>what is Ping?</h3>
  • Ping is a simple command that can test the reachability of a device on the network.
<h3>what is Traceroute?</h3>
  • Traceroute is a command you use to 'trace' the route that a packet takes when traveling to its destination.
  • It's useful for tracing network problems, discovering where connections fail, and tracking down latency problems.

To learn more about it, refer

to https://brainly.in/question/32165678

#SPJ4

6 0
2 years ago
Question 4 of 5
ikadub [295]

Answer:

A. Lifelong Learning.

8 0
3 years ago
Read 2 more answers
Define cyberstalking ?​
Tanzania [10]

Answer:

Cyber stalking involves using electronic means , including Internet or to stalk or harass a person . I

8 0
3 years ago
Read 2 more answers
Which camera options shows time to be slowly
serious [3.7K]

Answer:

.25 speed or slo mo (when recording on phone)

8 0
3 years ago
Sftp uses which mechanism to provide security for authentication and data transfer?
12345 [234]

Sftp uses SSH mechanism to provide security for authentication and data transfer.

<h3>What are SSH known for?</h3>

SSH or Secure Shell is known to be a kind of a network communication protocol that helps two computers to be able to communicate and also  share their data.

Therefore, one can say that Sftp uses SSH mechanism to provide security for authentication and data transfer.

Learn more about  SSH mechanism from

brainly.com/question/13086077

#SPJ12

3 0
2 years ago
Other questions:
  • The ListIterator interface
    13·1 answer
  • On the Internet, you can use a(n)______to look for information on any topic, such as books, movies, scholarly articles, news, an
    6·2 answers
  • What is a catalyst? a chemical found in leaves a chemical which promotes a chemical reaction a chemical which reacts with sunlig
    10·1 answer
  • Which scenario shows the best example of intrinsic motivation?
    13·2 answers
  • Your customer then asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his
    7·2 answers
  • How do you distinguish between misrepresentation and embellishment of one’s professional accomplishments on a résumé? Provide an
    14·1 answer
  • the following names are considered valid names for variable except for a. ST_Name b. ST name c. STName​
    9·1 answer
  • Five types of conflict in the school​
    9·2 answers
  • In a computer-controlled greenhouse, a temperature sensor and a window motor are connected to the computer.
    10·1 answer
  • A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!