1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
15

How can rows be added to a table? Check all that apply.

Computers and Technology
2 answers:
Lubov Fominskaja [6]3 years ago
8 0

Tables are used to display information in a more arranged and organized manner.  

Various ways of adding a row in an already existing table are:

1) By drawing a row in the table using the draw option.

2) By using the insert option under the Table Tools tab.

3) By designing the table with an added row using the Design tab.

<u>Explanation:</u>

In the insert option, go to the extreme right corner. There appears an option of Draw Table. Draw another row and it gets added.  

This tab contains two tabs, Design and Layout that enable you to rapidly arrange your table, embed or erase lines and sections, set the arrangement for cells, and organization the typography of the content in your table.

Thus, a table and its capacity are built up from here on and open for designing.

ivanzaharov [21]3 years ago
3 0

Answer:

(B) by using the Insert option under the Table Tools tab

(E) by clicking the plus sign that appears on the left side of the table

Explanation:

just took it!!

You might be interested in
Building relationships during your career exploration is called
elena-s [515]
Building relationships during your career exploration is called networking. This is when you are forming relations with those around you so that opportunities may turn up.

Your answer is: Networking 

Have an great day mate!
6 0
3 years ago
Read 2 more answers
An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
LenaWriter [7]

In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.

<h3>Should a person use certificate pinning?</h3>

Mobile applications are known to be one that often make use of   certificate or also public key pinning so that they can be able to make sure that communications are secure.

Hence it is one that  is often implemented if  the developer of the application is said to be require to validate the remote host's identity or if operating in a harsh environment.

Hence, Certificate pinning hinders which certificates are considered valid for a any kind of website,  and as such, In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.

Learn more about certificate from

brainly.com/question/1874937

#SPJ1

4 0
1 year ago
Why would it be unusual to find a fossil of an organism’s eye?
Slav-nsk [51]
<span>The preservation of anything other than mineral skeletons is (with a few exceptions described below) an extremely rare event. Anything that can decay is likely to be lost. Fur, skin, internal organs – all are immensely vulnerable to the destruction by bacteria, fungi and scavengers that assure their recycling back into the ecosystem. </span>
8 0
2 years ago
Help please not trying to fail
deff fn [24]

Answer:

B. Everywhere CFCI is not

8 0
3 years ago
How many times is the second for loop going to loop in this block of code? Write your answer in numeric form in the box provided
pantera1 [17]

Explanation:

The second for loop does 1 of 4 iterations for every 1 of 5 iterations of the parent loop. meaning it is 4 x 5 which is 20.

8 0
2 years ago
Other questions:
  • Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it app
    15·1 answer
  • Which osi layer is responsible for combining bits into bytes and bytes into frames?
    8·1 answer
  • Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
    8·1 answer
  • Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
    13·1 answer
  • What is looping in QBASIC​
    9·1 answer
  • "The ability to create methods with the same name that are in different classes" is known as ________.
    14·1 answer
  • A noisy signal has been uploaded to D2L in the files fft_signal.mat and fft_signal.txt.Write a program to estimate the power spe
    10·1 answer
  • Www.microsoft.com is an example of this (two words) (last letter is e) and has to be (10 letters)
    10·1 answer
  • Choose the type of error described.
    12·1 answer
  • Where do charts get the data series names?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!