1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nostrana [21]
3 years ago
15

Drag each tile to the correct box click the filter option in the submenu of data, click the data option in the menu of the sprea

dsheet , select the header row of the data sort , in the filter dialog box enter the filter criteria, click ok
Which Order do they go in

Computers and Technology
1 answer:
SOVA2 [1]3 years ago
7 0

Filters can be used to narrow down the data in the worksheet .It is a method to show only the qualitative data.Filters are used to show the data that is only required to be displayed

Explanation:

<u>Following are the steps in filteration</u>

  • Begin with a worksheet that identifies each column using a header row.
  • Select the Data tab, then locate the Sort & Filter group.
  • Click the Filter command.
  • Drop-down arrows will appear in the header of each column.
  • Click the drop-down arrow for the column you want to filter. In this example, we'll filter the Type column to view only certain types of equipment.
  • The Filter menu appears.
  • Uncheck the boxes next to the data you don't want to view, or uncheck the box next to Select All to quickly uncheck all.
  • Check the boxes next to the data you do want to view. In this example, we'll check Laptop and Projector to view only these types of equipment.
  • Click OK. All other data will be filtered, or temporarily hidden. Only laptops and projectors will be visible.
You might be interested in
An IT department submits a purchase order to buy a new computer from a vendor. "Purchase orders" are documents issued by buyers
Umnica [9.8K]

Answer:

Procurement

Explanation:

Characteristics hardware lifecycle:

  • Procurement- Acquiring new IT hardware assets involves evaluating vendors, purchase orders, receiving, and device labeling.
  • Deployment - Hardware configuration and installment, placing hardware and software assets into production environments.
  • Maintenance & Support - Management of assets include scheduling scans and getting audit history.
  • Upgrade - Before you retire your IT hardware assets, you’ll reach a processing plateau that can be restored with hardware upgrades.
3 0
4 years ago
Money money money money
elena-s [515]

Answer:

i love money <3

Explanation:

8 0
4 years ago
Read 2 more answers
The purpose of the ___________ is to provide sufficient notice to individuals whose personal information has been stolen so they
Ahat [919]

Answer:

California Identity Theft Statute

Explanation:

The California Identity Theft Statute, also referred to as the Penal Code 530.5 PC is a statute that clearly provides a definition of what the crime of identity theft actually is. Identity theft is a crime committed when the personal identifying information of another person is taken and used unlawfully or fraudulently. The statute further provide ample information to victims of identity theft in order to avert such occurrence or further damage.

4 0
4 years ago
ShellShock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, whi
mina [271]

Answer: Windows

Explanation:

ShellShock: Also called Bashdoor, it is a security bug which is found in the Bash shell of operating system e.g. Unix. It allows the hacker to execute scripts and commands by gaining unauthorized access. This affects many machines, devices that use Bash. Servers like web servers are most affected as most of them run Unix based OS like OS X. Most vulnerable are those who use Unix or Linux operating systems.  

Microsoft Windows does not use Bash so it does not directly affect Windows os. For those who are using Windows PC, Windows phones and websites that are developed by MS software are non-vulnerable to ShellShock.

4 0
3 years ago
Why might a peer-to-peer network not be the best choice for a large corporate office setting?
omeli [17]

Answer:

a it is less private

Explanation:

8 0
4 years ago
Other questions:
  • Which of these is a subdirectory? <br> HTTPS <br> /FAQ <br> .org <br> WWW
    15·1 answer
  • 6. While using the HTS, ________________ will help maintain a safe driving environment despite high speeds and a large number of
    12·1 answer
  • the microsoft excel application is a _____ program. database word-processing spreadsheet desktop-publishing
    8·1 answer
  • What is the name given to a collection of related fields such as ID number,name and address?
    12·1 answer
  • Assume n represents the number of inputs. The possible number of states within a truth table can be calculated using which of th
    10·1 answer
  • To gain a competitive edge this year, the upper management of a global IT company has decided to focus on customer service, empl
    13·1 answer
  • Which of the following prefixes would be best to use when measuring your own mass?
    15·1 answer
  • Custom actions help your users by
    6·1 answer
  • 3. In 1989, the first handheld console was released by _____ and it was called ________.
    13·1 answer
  • Task 2: Typing a School Speech
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!