1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
choli [55]
3 years ago
7

To delete only the selected contents of the table, but not the table itself, ____.

Computers and Technology
1 answer:
Volgvan3 years ago
6 0

To delete only the selected contents of the table, but not the table itself, you need to click on this cell in the table.

You might be interested in
A device which lets you interact with the computer
Gnoma [55]

Answer:

Input, output, storage.

Explanation:

Input is used to interact with, or send data to the computer (mouse, keyboards, etc.). Output provides output to the user from the computer (monitors, printers, etc.). And storage which stores data processed by the computer (hard drives, flash drives, etc.).

3 0
2 years ago
Read 2 more answers
Which method is useful for dimensionality reduction especially for small data-sets?
Anna [14]
Independent Component Analysis (ICA) is based on information-theory and is also one of the most widely used dimensionality reduction techniques.
8 0
2 years ago
Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string
erica [24]

Answer:

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Explanation:

Byte pair encoding is a form of encoding in which the most common pairs of consecutive bytes of data are replaced by a single byte which does not occur within the set of data.

For example, if we has a string ZZaaAb, it can be encoded if the pairs of string ZZ are replaced by X and the second pair by Y. So, our data now becomes XYAb.

To get our original data, that is decode it, we just replace the data with the keys X = ZZ and Y = aa thus allowing our original data to be restored.

Since our original string is restored without loss of data, it implies that <u>byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.</u>

8 0
2 years ago
Your browser has blocked your from your crucial secure intranet sites. What could be the problem?.
Alenkinab [10]

A browser is a program that allows and provides the user access to information and web pages on the internet. It blocks someone when their SSL certificate status has been voided.

<h3>What is an SSL certificate?</h3>

An SSL (Secure Sockets Layer) certificate is a digital code and certificate present on the web that authenticates and provides security for communication. It is a security protocol that allows encrypted transmission.

The firewall supervisor sets the rule to block or allow the users to connect to Crucial Secure Intranet Sites based on their SSL certificates. SSL certificate if gets revoked then does not allow users to reach the site and declares it to be a potential risk.

Therefore, the browser is not reachable when the SSL certificate gets expired.

Learn more about SSL certificates here:

brainly.com/question/24276018

#SPJ1

3 0
2 years ago
What are sums of money that are given out for specific reasons?
xenn [34]

Answer:

a

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Create a function average_temp(s) that accepts a file name s that contains temperature readings. Each line in the file contains
    15·1 answer
  • Exterior brick veneers are used to support the entire weight of the roof structure
    12·2 answers
  • If Word finds a potential error in a document, a red, green, or blue wavy underline flags the problem. True or False
    6·1 answer
  • The keyboard usually has six rows of keys. Which of the following is not one of the key group categories?
    7·2 answers
  • What part of a computer is the most important?
    13·2 answers
  • Select the correct answer from each drop-down menu.
    10·2 answers
  • CALLING ALL DEKUS UWU
    15·2 answers
  • Assignment 10 - 1/0 Streams and Files Create a C++ a program that will compute the average word length (average number of charac
    13·1 answer
  • Write a q basic program to find the sum of all the even numbers from 1 to 50​
    14·1 answer
  • Where to store <br> ammunition
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!