1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna71 [15]
3 years ago
12

Laura has a list of the SAT scores of over a thousand students. She needs to write to the top 10 students but exclude students t

hat come from specific schools. How can she quickly get this list together?
A.)Laura can add two levels to Sort by, first sorting by score and then sorting by school.

B.Laura can use the Find function to find all the students who attended each school and their score.

C.Laura can Sort the scores, cut and paste it into a new sheet and then use the Sort function again to organize them by school.

D.)Laura can apply a Filter for the top 10 students and a Filter for which schools to exclude from the results.
Computers and Technology
2 answers:
klasskru [66]3 years ago
7 0
It would be A  hope this helps
fiasKO [112]3 years ago
3 0
D.)Laura can apply a Filter for the top 10 students and a Filter for which schools to exclude from the results.
You might be interested in
What is the value of: 1 + int(3.5) / 2?<br> Select one:<br> a. 2<br> b. 2.25<br> C. 2.5<br> d. 3
Drupady [299]

Answer:

C (2.5)

Explanation:

int(3.5) = 3

So, using order of operations, (3/2)+1=2.5

8 0
3 years ago
Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____.
fgiga [73]
Web-centric systems
3 0
2 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
What text structure this is
jasenka [17]

Compare And Contrast.

6 0
3 years ago
Identify the 1950s programming languages. Choose all that apply.
erastova [34]

Answer:????????????????

Explanation: So sorry

6 0
3 years ago
Other questions:
  • A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a par
    12·1 answer
  • Select the statement that accurately describes why the Italics function is being used in the sentences below.
    8·1 answer
  • What feature new to Windows Server 2012 provides the ability to find identical sets of data on a SAN based storage array and red
    14·1 answer
  • Laura wants to know more about the organization to which she has applied. What can she do to know more about the organization’s
    12·1 answer
  • Write a program which asks the user to enter N numbers. The program will print out their average. Try your program with the foll
    11·1 answer
  • You are late in the preparation of the computer graphics for your final report and presentation. You run into a friend who is gr
    13·1 answer
  • The gene form of a trait is called a(n) ​
    10·1 answer
  • ¿Por qué es importante aprender a programar?
    9·1 answer
  • What were the names of Henry VIII's six wives?
    9·2 answers
  • quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!