1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sloan [31]
3 years ago
10

As u type where does excel display the entry

Computers and Technology
1 answer:
grigory [225]3 years ago
5 0

Answer:

The Active cell inside Excel Worksheet is used to identify the cell which is currently active. The thick border gridlines around the cell indicates that it is the Active cell inside Excel Worksheet. The Active cell is where the focus is on and where the data will be entered when a key is typed on keyboard.

You might be interested in
How do you access the dark web? What are the negatives of doing this?
Inessa05 [86]
The dark web is illegal and therefore people can hack you, obtain your information (identity theft) etc.
6 0
3 years ago
These are pictorial images displayed on a computer screen​
Mrrafil [7]

Answerthats nice

(: -With Star

Explanation:

3 0
2 years ago
An example of java code for a sandwich shop menu
julia-pushkina [17]

Answer:

16847882

Explanation:

4 0
3 years ago
Learning design software, applying to college and creating a website to showcase work are examples of _____________ that lead to
mariarad [96]

Answer:

Web designer

Explanation:

A Web designer is someone who knows about some programming languages like HTML, CSS or JavaScript, but in website development, there are two main areas, in this case, Front-End and Back-End.

A web designer uses Front-End because it only elaborates on the system's view and all about the view for the users.

7 0
3 years ago
In Linux, the /etc/inittab file describes the processes that are started up during boot up. Each entry in the /etc/inittab file
Softa [21]

Answer:

The answer is "Action".

Explanation:

The directory /etc/inittab file is also known as a configuration file that is used by the System V (SysV) initialization system in Linux. where System V stands for system version that is used for Unix and Linux both. It was developed in AT&T. This configuration file includes three items that are:

  • Runlevel norm
  • Which procedures should you begin, track and restart when you end?
  • Which actions to perform when a new run level is introduced?

Example: id:runlevels:action:process

  • id stands for identification code. It includes a sequence of one to four characters that identify in function.
  • runlevels it is a list that runs on levels in which this applies.
  • action is a specifies code in the field that describes to init how to run the process.  
  • A process is a command that is ready to execute.
3 0
3 years ago
Other questions:
  • Convot the following biliary number into decimal form using any method ? (1010.100)2
    8·1 answer
  • You are reviewing the code written by another programmer, and encounter a variable whose name is entirely in capital letters. Wh
    15·1 answer
  • What feature of virtualization software allows you to revert to a previous point in time in the event you make an unrecoverable
    9·1 answer
  • Jade has to present a paper on the basic architecture of the Princeton microcomputer architecture model. Which option will he hi
    5·1 answer
  • Which of the following statement about device formatting is FALSE?
    10·1 answer
  • What determines how a system will work to meet the business needs defined during system investigation?
    13·1 answer
  • You want to deploy a software package that's available to all users in the domain if they want to use it, but you don't want the
    7·1 answer
  • A domain's ____ settings must be configured correctly so that the mail transfer agent (mta) can establish a connection with a re
    15·1 answer
  • Suppose an initially empty stack S has performed a total of 15 push operations, 12 top operations, and 13 pop operations ( 3 of
    5·1 answer
  • what is required to successfully establish a connection between two routers using chap authentication?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!