1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
4 years ago
7

How do you strike through text in excel?

Computers and Technology
1 answer:
Valentin [98]4 years ago
6 0
In the font options there is a checkbox for strikethrough. Same dialog as word, only there is no button in the ribbon for it. You could customize that by creating a custom group if you want to.
You might be interested in
Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
Burka [1]

Answer:

By Using the Greedy- Activity- Selection algorithm

Explanation:

The Greedy- Activity- Selection algorithm in this case involves

First finding a maximum size set S1, of compatible activities from S for the first lecture hall.

Then using it again to find a maximum size set S2 of compatible activities from S - S1 for the second hall.

This is repeated till all the activities are assigned.

It requires θ(n2) time in its worse .

3 0
4 years ago
David has created a lot of styles and now his Quick Style Gallery contains styles he no longer uses.
shusha [124]

Answer:

Right-click the style in the Quick Styles Gallery, and select the Remove from Quick Style Gallery option.

Explanation:

3 0
4 years ago
What functionality can a vulnerability scanner provide that a port scanner cannot?
Rina8888 [55]
<span>Sending alerts when new systems are added to the network is the functionality that a vulnerability scanner can provide and a port scanner cannot.
</span>port scanner<span> allows testing of open </span>ports and firewalls. It d<span>iscovers open UDP </span>ports<span> on your target system by </span>scanning with NMAP and by doing so it is<span> the first step of a complete </span>vulnerability<span> assessment. </span>
7 0
3 years ago
How does having constraints placed on a design change the engineering process
Delvig [45]
Having constraints on a design will change the engineering process and the process will take a long time to finish. The process eats up time, quality and budget especially when it involves prototypes and the like. Some common constraints involve the design itself and the engineer. 
8 0
4 years ago
Read 2 more answers
Jamie is writing an investigative report with footnotes
xxTIMURxx [149]

Answer:

????

Explanation:

does she need help with the footnotes?

7 0
3 years ago
Read 2 more answers
Other questions:
  • The method header of the equals() method within the string class is ____.
    13·1 answer
  • Live preview is available on touch screen
    5·1 answer
  • On a camera,what does focus tracking do?
    6·1 answer
  • Design a ROM of size 64X8 bit in VHDL. Your ROM takes as input an address and a clock and output the content of the ROM at the c
    7·1 answer
  • Five differences between monitor and printer
    15·1 answer
  • The year in which HTML was first proposed?
    14·2 answers
  • *
    6·2 answers
  • Is it true or false 1-5
    13·1 answer
  • SOMEONE HELP 60 POINTS!!!!! When creating business publications, these two factors must be determined before planning the layout
    8·2 answers
  • What's this little?<br>​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!