1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Akimi4 [234]
3 years ago
8

What symbol indicates that a cell is not wide enough to display its numbers ?

Computers and Technology
2 answers:
Genrish500 [490]3 years ago
6 0

Answer:

D. <u><em>a pound sign</em></u>

Yuki888 [10]3 years ago
3 0

Answer:

Option D is correct. A pound sign is used to indicates that a cell is not wide enough to display its numbers.

Explanation:

A pound sign symbol indicates that a cell is not wide enough to display its number in Excel. However, it is noted that if you use or installed a US keyboard in your computer then hash symbol (#) is shown and the pound sign symbol is shown if you use or installed the UK keyboard layout in your computer.

Why other options are not correct.

  • An Asterisk symbol:

this symbol is used for multiplication in formula or in a cell to multiply the numbers with each other.

  • A dollar sign:

A dollar sign is used in a cell to show the currency. If you want to show the cell value as a currency. Then, you can use the dollar sign.

  • Percentage Sign

Percentage sign in the cell shows that value in a cell is representing a percentage of some values.

You might be interested in
Really helpful, I want to get together tomorrow ,Later I will follow and make it the best answer
blagie [28]

Answer:

c

Explanation:

8 0
3 years ago
Henry has created a software product that manages a database of company clients. He wants to install the software on a client's
UkoKoshka [18]

Answer:

The answer is " Run the software on the original web browser practically".

Explanation:

The Virtual servers enable you to run programming not programmed to the devices. Let's all presume which Henry's software will operate on computers but not on the mac. Since Mac is unable to run this software, it can practically install Linux on MC and install this.

  • The several common software applications such as parallels, VMware, and Virtual machines could be practically used during mac to install windows.
  • Its platform operating system from a macOS software perspective is a true physical computer with almost everything set.
5 0
3 years ago
Can somebody hack ur account on Brainly bc I feel like I have bc I have answered waaaaaay more questions than shows on my profil
QveST [7]
It says you’ve only answered 11, but yeah it you’re account CAN be hacked
4 0
3 years ago
Jim is a forensic specialist. He seized a suspect computer from a crime scene, removed the hard drive and bagged it, documented
Andreyy89

Answer: Jim left the computer unattended while shopping for supplies to be used at the next crime scene.

Explanation: While transporting the evidence to a secure location (lab), he left the computer unattended in his car and goes shopping for supplies that will be used in his next crime scenes. This act will give the criminals or their accomplice the opportunity to break into his car and tamper with what ever evidence he might have left behind in his car.

7 0
3 years ago
The master system database stores a database template that is used as a blueprint when creating a new user database.
Novay_Z [31]
<span>An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a</span>
6 0
3 years ago
Other questions:
  • Within the hardware of the personal computer temporary memory is known as
    10·2 answers
  • Where does the term for a star network describe? A) a network for Department of Defense scientists to share data about the stars
    13·2 answers
  • What are the examples of shareware?
    9·2 answers
  • Explain briefly the purpose of the Computer Management Console in Microsoft Windows.
    12·1 answer
  • Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles' largest
    15·1 answer
  • I NEED HELP ASAP
    8·1 answer
  • . Write programming code in C++ for school-based grading system
    8·1 answer
  • What is the relationship between agile teams and project requirements
    9·1 answer
  • A laptop can be kept on palm to work. [true/false) ​
    5·1 answer
  • How can structure of a table change in sql. What general types of changes are possible
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!