1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jolli1 [7]
3 years ago
13

Which of the following terms refer to the horizontal line of continuous cells in a table

Computers and Technology
1 answer:
Reika [66]3 years ago
7 0

Although you did not include the options, I can still help you with your question. The correct answer is row.

The horizontal line of continuous cells in a table is called a row. The opposite of a row, which would be the vertical line of continuous cells in a table, is a column.

You might be interested in
Select the correct answer from each drop-down menu.
Lelu [443]

Answer:

First: .Net

Second: New Zealand

Explanation:

Net is short for Network.

NZ means New Zealand.

3 0
4 years ago
Read 2 more answers
_____ creates a border or space that separates information.
KATRIN_1 [288]
A. Padding
*************
7 0
3 years ago
What tool allows you to search external competitive intelligence research?
enot [183]

Answer:

SocialPeta

Explanation:

4 0
2 years ago
If you have questions about taxes, where can you go to get answers?
Andrews [41]

Answer:

Explanation:

i was told to paste this to other comment sections sooo...HEY PLS DON'T JOIN THE ZOOM CALL OF A PERSON WHO'S ID IS 825 338 1513 (I'M NOT SAYING THE PASSWORD) HE IS A CHILD PREDATOR AND A PERV. HE HAS LOTS OF ACCOUNTS ON BRAINLY BUT HIS ZOOM NAME IS MYSTERIOUS MEN.. HE ASKS FOR GIRLS TO SHOW THEIR BODIES AND -------- PLEASE REPORT HIM IF YOU SEE A QUESTION LIKE THAT. WE NEED TO TAKE HIM DOWN!!! PLS COPY AND PASTE THIS TO OTHER COMMENT SECTIONS

4 0
3 years ago
_____ is the unauthorized entry into a computer system via any means
Montano1993 [528]
Hi,

The word you are looking for is "Hacking".

"Hacking is unauthorized entry into a computer system via any means."

Hope this helps.
r3t40
4 0
3 years ago
Other questions:
  • Fill the validateForm function to check that the phone number contains a number (use the isNaN function) and that the user name
    10·1 answer
  • Ou have just set up a network that will use the tcp/ip protocol, and you want client computers to obtain ip configuration automa
    9·1 answer
  • True / False<br> 1. A byte is a standardized unit of measure that is always 8-bits.
    7·1 answer
  • In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet
    8·1 answer
  • Drag the correct type of update to its definition.
    13·1 answer
  • The technology dealing with robots is called
    6·1 answer
  • Do pc players ever go outside?
    11·2 answers
  • (a) List 5 keys we can type with our left hand fingers
    9·1 answer
  • Why do you want to work for Rev?
    5·1 answer
  • What represents a user’s specific preferences?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!