1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
4 years ago
10

Create a custom list using cells A2 A12.

Computers and Technology
1 answer:
Dafna1 [17]4 years ago
7 0

Answer:

To create a list of the cells A2 to A12, convert the A2: A12 range to a table, then select the data validation tab, input list as the type and the name of the A2:A12 range table, and then click ok. This list can now be used as a validation list in another column or worksheet.

Explanation:

Microsoft Excel provides the power of tables and list for categorized data and data validation.

You might be interested in
The efficinecy for solving the towers of hanoi problem recursively
V125BC [204]

Answer:

B.O(2n)

Explanation:

The time complexity of solving towers of hanoi problem recursively is O(2n) because there are two recursion calls in the solution of tower of hanoi.First recursive call to move n-1 disks to from source to helper then the user moves nth disk from source to destination after that recursion moves n-1 disks from helper to destination using source as helper rod.So each recursive call make two more recursive call this makes the time complexity be O(2n).

8 0
4 years ago
C++ Problem: In the bin packing problem, items of different weights (or sizes) must be packed into a finite number of bins each
ipn [44]

xekksksksksgBcjqixjdaj

4 0
4 years ago
Do you know best way to know WiFi password which you are connected to?​
borishaifa [10]

Answer:

Download a wifi password saver on playstore or appstore

Explanation:

8 0
3 years ago
Read 2 more answers
2. A _______
miv72 [106K]

Explanation:

A computer is an electronic device that can store and proceda

7 0
3 years ago
How is a worm different from a Trojan?
olga_2 [115]

Answer:

C. A worm spread through a network, whereas a trojan hides inside another program.

Explanation:

Worms spread through computer networks, a great example of a popular computer worm that struck the world is the "ILOVEYOU" / "Love Letter for You" worm. The malware infected over ten million personal computers and was spread via the user's email and sent to all addresses in the user's address book.

A trojan virus is essentially a piece of malicious software that looks legitimate from the outside but in under the seal it's highly malicious and destructive; hence how it got it's name "Trojan Horse" which is a reference to an Ancient Greek story of deception.

8 0
3 years ago
Other questions:
  • To what device, inside the computer, do all other devices connect
    10·2 answers
  • an organization that maintains a gateway to the Internet and rents access to customers on a per-use of subscription basis\ and W
    11·1 answer
  • A program called the ______ combines the object program with other programs in the library and is used in the program to create
    5·1 answer
  • List 7 ways of generating<br>airlines​
    15·2 answers
  • I need help with getting a profile pic
    5·1 answer
  • How are the monsters related to humans
    5·1 answer
  • Which of the following is not an example of debugging? looking for errors in programming code. fixing misspelled commands in pro
    13·1 answer
  • What is the area on a machine where work is actually being performed and
    12·1 answer
  • Briefly explain what an array is. As part of your answer make use of a labelled example to show the declaration and components o
    5·1 answer
  • Can someone help me and explain
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!