1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
2 years ago
7

NEED FIVE QUESTIONS ANSWERED!!!

Computers and Technology
1 answer:
jeka942 years ago
3 0

Answers:

A. Create a spreadsheet

The MS Excel software is a type of software that allows users to create spreadsheets that can contain a large number of data. These spreadsheets are mainly used to store information of businesses or simply used to organize different information in a table like form.

C. The rectangular box where a column and row intersect

A cell is a rectangular box where a column and row intersect in a spreadsheet. These cells can store one piece of data at a time and have unique coordinates to separate them from each other.

D. AutoComplete only works when the first character is a text.

The AutoComplete feature in MS Excel is a feature that can give a suggestion of what the user is trying to input into a cell. This feature will only work when a user inputs a text (e.g. A to Z and 0 - 9). If a user inputs a special character, the AutoComplete feature will not be able to recognize it.

B. Home

The Home tab contains the main formatting tools in a spreadsheet. The home tab is one of the most used tabs in MS Excel as most of the inputs in a spreadsheets will most likely need formatting to make it more understandable to the users.

B. Hide the row and unhide it when the new season begins.  

The hide feature in MS excel allows users to select a row(s) or column(s) of the spreadsheet to temporarily remove the selected rows or columns and prevent users from editing information in them. The unhide feature will simply reveal the hidden selection to allow the user to edit the information again.

You might be interested in
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back schema S
ikadub [295]

Answer:

1. DBMS

C. <em>A storage system that provides efficient access to randomly chosen items</em>

G. <em>Performs database operations requested by application software</em>

2. data mining

B. <em>The process of extracting hidden information</em>

3. hash file

A. <em>A. means of locating a particular record within a file</em>

4. index key field

F. <em>An item used to identify records uniquely</em>

5. locking protocol

E. <em>A system to guard against database errors due to performing transactions concurrently</em>

6. relation

D. <em>A structural unit (with rows and columns) in a popular database model</em>

7. roll back schema

I. <em>A "road map" of a particular database's design</em>

J. <em>To "unwind" a transaction</em>

8. SQL

H. <em>A popular language that implements relational database operations.</em>

5 0
3 years ago
Packet switching was invented by: <br> Apple <br> DARPA <br> Google <br> Microsoft
riadik2000 [5.3K]

Answer:  darpa

Explanation:

8 0
3 years ago
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. Yo
-BARSIC- [3]

Answer:

b. Same SSID, different channel

Explanation:

The Service Set Identifier (SSID) is a sequence that is included in all of the sets in a wirless network and helps identify them as part of the network. Because both points connec to the same network they need the same SSID.

7 0
3 years ago
Identify the following verb by number and person by checking on the appropriate boxes.
Makovka662 [10]
Second person ig Imao yeah
3 0
2 years ago
Read 2 more answers
Other questions:
  • What is the size of the key space if all 8 characters are randomly chosen 8-bit ascii characters?
    6·1 answer
  • Information management examines the organizational resource of information and regulates its definitions, uses, value, and distr
    11·1 answer
  • Which phrase is a comparison operator for inserting a not equal to argument in an IF, COUNTIF or SUMIF function? &lt;= &lt;&gt;
    9·1 answer
  • What type of things can be marketed
    11·1 answer
  • Which statement is NOT CORRECT?
    11·1 answer
  • Which of the following are pointers?
    9·1 answer
  • What year did polaroid introduce one-step photography with the SX-70
    14·1 answer
  • Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?.
    10·1 answer
  • What color pixels are used in a camera?
    10·2 answers
  • What kind of company would hire an Information Support and Service employee?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!