1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
4 years ago
14

WILL MARK BRAINLIEST AND WILL GIVE 100 POINTS!!!!!!!!!

Computers and Technology
2 answers:
yaroslaw [1]4 years ago
8 0

i have learned that an excel spreadsheet can:

1. calculate the sums of many values within that sheet

2. sort values by title

3. format specific values to have different colors or highlights

4. form pie charts out of tables of data

5. make tables of data

6.  form bar graphs out of tables of data

7. calculate how many cells have numerical values within a set of data

8. change the width of cells

9. change the height of cells

10. fill a cell in with color

ella [17]4 years ago
4 0

1. The best thing is Excel can plot x-y graphs.

2. It can also plot pie charts.

3. It can sort things by numbers in any order.

4. It can also sort by alphabetical order.

5. It can calculate the sum of a large number of data.

6. It can also calculate the average of a large number of data.

7. It can highlight data that satisfy specific condition(s).

8. It can filter data that satisfy specific condition(s).

9. It can make formatted tables.

10. It can also make formatted spreadsheet.

You might be interested in
PLEASE HELP!!!
anygoal [31]

Answer:

you need to properly indent it

Explanation:

align your codes

5 0
3 years ago
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
ra1l [238]

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

8 0
4 years ago
What process combines data from a list with the content of a document to provide personalized documentsWhat
Morgarella [4.7K]
Mail merge can combine data with the content of a document to make personalized documents.
6 0
3 years ago
Read 2 more answers
How to create PowerPoint presentation computer networking using visual diagrams
DanielleElmas [232]

https://www.google.com/url?sa=t&source=web&rct=j&url=https://support.office.com/en-us/article/video-create-a-network-diagram-a2360cd9-5c9d-4839-b4f6-17b485e02262&ved=2ahUKEwjlr4bdjd7hAhUiyYUKHR1UC1EQwqsBMAB6BAgLEAU&usg=AOvVaw3ZFpgzww1z4gFaeRCROkF-

7 0
3 years ago
In computer science, what does the word security mean?
zepelin [54]

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

4 0
3 years ago
Other questions:
  • Given input characters for an arrowhead and arrow body, print a right-facing arrow. Ex: If the input is: *
    14·1 answer
  • The best-known communications protocol is probably smtp, which regulates internet data transport. _________________________
    6·1 answer
  • Ex. Q about the crazy effects of complements/substitutes on a wide range of goods:
    7·1 answer
  • A(n) _____ is a computer network that uses Internet Protocol technology to share information, operational systems, or computing
    14·1 answer
  • Mention 5 advantages of internet​
    8·1 answer
  • Write the generation in which transistors were used!
    12·1 answer
  • What does GUI stands for and what is it function?​
    5·2 answers
  • When working in outline mode, press __________ and click the eye icon to change only one layer back to preview mode.
    10·1 answer
  • Carl wants to add two new characters to the extraterrestrial battleship game he's
    15·1 answer
  • What are two benefits of defining a function?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!