1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ankoles [38]
3 years ago
11

Which spreadsheet toolbar displays options such as Cut and Paste?

Computers and Technology
2 answers:
Lilit [14]3 years ago
6 0
The answer would be ''Drawing Toolbar'' and you can find this inside your mouse area, where u click the right button (right side) and it shows a small chart/toolbar where it gives you the options to copy, cut, paste and more.
Free_Kalibri [48]3 years ago
5 0
The standard toolbar
You might be interested in
A USB zipper drive is a small data storage device that plugs into a computer's USB port.
choli [55]
<span>A. True. hope this is what u are looking for</span>
5 0
3 years ago
Several NEC® sections contain the requirement to size conductors and overcurrent devices at 100 percent of the noncontinuous loa
9966 [12]

Answer:

125 percent of continuous load

Explanation:

8 0
3 years ago
Note oj cyber security​
dybincka [34]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

  • Network security
  • Application security
  • Endpoint security
  • Data security
  • Identity management
  • Database and infrastructure security
  • cloud security
  • Mobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

7 0
3 years ago
Tina has taken the time to modify font sizes and colors in a text box and would like to duplicate those settings on other text b
Ivan

Answer:

a, duplicate the object.

Explanation:

just took the exam on edg

5 0
3 years ago
Read 2 more answers
Notes on secondary memory​
gladu [14]

Answer:

non-volatile and persistent in nature

7 0
3 years ago
Other questions:
  • What part of a file name does windows use to know which application to open to manage the file?
    13·2 answers
  • In a game, your character cleverly places an electronic bug on an unsuspecting felon's jacket to track his movements. The bug tr
    10·2 answers
  • What is a binary message
    12·2 answers
  • Which online resource is usually not free?
    10·2 answers
  • Computers that belong to the same domain can access a common security database of user and computer account information. This ty
    5·1 answer
  • What is the base for a hexadecimal number system?
    11·1 answer
  • Suppose the message 111010 is to be transmitted (beginning with the leftmost bit) using
    6·1 answer
  • Which of these expressions is used to check whether num is equal to value?
    13·1 answer
  • How do i change the default setting in word to no open in dark mode
    8·1 answer
  • Put these numbers in order from smallest to largest:<br> 1. 00101112<br> 2. 011110<br> 3. 011110112
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!