1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kramer
4 years ago
8

Users can customize sparklines In Excel 2016 using which items? Choose two answers Here are the possible answers: Location , sty

les , formula , markers.
Computers and Technology
1 answer:
andriy [413]4 years ago
4 0

formula and styles maybe

You might be interested in
Without a/an ________. a computer is useless
Len [333]
Without a/an Operating system. a computer is useless
3 0
3 years ago
You would like the word "Employee" to appear in cells A1, B1, C1, D1, and E1. To be efficient, you should
Agata [3.3K]

Answer: type the label in A1 and use autofill

Explanation:

Took the final 2021 Edgeunity

6 0
3 years ago
Joan typed an entire page of her English essay. She is now at the bottom of her document and can’t see the top. What should Joan
polet [3.4K]

Answer:

I hope this help

The answer is Menu

7 0
3 years ago
What service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?
dmitriy555 [2]

Answer:

The answer is Remote desktop services.

Explanation:

What service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?

The answer is Remote desktop services.

Desktop virtualization is a software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.

Desktop virtualization can be used in conjunction with application virtualization and user profile management systems, now termed "user virtualization", to provide a comprehensive desktop environment management system. In this mode, all the components of the desktop are virtualized, which allows for a highly flexible and much more secure desktop delivery model. In addition, this approach supports a more complete desktop disaster recovery strategy as all components are essentially saved in the data center and backed up through traditional redundant maintenance systems.

6 0
3 years ago
Pa help po brainliest po kayo kon may nakita ako ng brainliest at mag wait kayo nga i brainliest kailangan ko ngayon please, hel
notka56 [123]

Answer:

hi

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

good evening

8 0
3 years ago
Other questions:
  • Declare a character variable letterStart. Write a statement to read a letter from the user into letterStart, followed by stateme
    10·1 answer
  • Cell C2 contains the formula "=10+D3". If you copied C2 to A1, what would be the formula in A1? =10+B2 =10+F2 =10+B4 =10+F4
    14·1 answer
  • In Java the ______________are not objects. All of the rest areobjects, or any ___________ is called as object.
    10·1 answer
  • An information system report is an example of...
    13·1 answer
  • My sister put my phone in the microwave and I'm pretty sure the battery blew up. I'm too scared to open the microwave. What do I
    11·1 answer
  • If you have a 99% and you got a 50 on a test what is the grade please I will give brainless
    7·2 answers
  • Why was it important for the date format to be standardized by the
    7·1 answer
  • C. There are two types of computer on the basis of size. true or false​
    5·1 answer
  • How can a cell phone tower help people​
    11·2 answers
  • Your computer science teacher asks you to sample a black and white image that is 4” x 6”. How would you sample the image to prov
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!