1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
3 years ago
8

If you entered data into row 4 and it should be in row 3, you should _____.

Computers and Technology
2 answers:
White raven [17]3 years ago
8 0

Answer:

We Should highlight that data which is in row 4 and then, drag it to the row 3.

Explanation:

The following way is the easiest way to fill the same data in the multiple rows as well as columns. We also have another way but that is time taking process to copy that data and then we paste that data in the next row or column. so that's why the following path is not time taking.

Novosadov [1.4K]3 years ago
7 0

<span>One should highlight the cell you entered the data wrongly in row 4, place your cursor on the top left or bottom left of the border of the cell until it turns into a two-sided arrow, and then drag</span> it to row 3.

You might be interested in
The difference between tool bar and status bar​
Snowcat [4.5K]

Answer:

A toolbar offers easier access to tasks typically conducted within the application whereas in the status bar it is displayed at the lower side of the web browser screens and other application windows.

Explanation:

8 0
2 years ago
An academic or professional blog would be especially useful in which of the following fields?
Vesna [10]
Blogs, even academic and professional, are not usually considered reliable sources. Most importantly, that's because they don't undergo the peer review process, which ensures the quality of the published papers (that they don't publish lies, in simple words).

So usually, you would prefer a published paper.

When then would you use a blog?
One such instance is when you want to find out about a quickly changing field , for example the newest standards in software development. So software engineering is one such field.

Another field is internet protection and security, as the viruses and the ways to defend against them also develop faster than can be published in a paper
7 0
3 years ago
Read 2 more answers
What will be the output of the following code?int p = 3,ch = 2;switch(ch){case 1: System. Out. Println("The square is: " + p*p);
kodGreya [7K]
“The cube is: 27”
or p^3
The switch function uses the ch int and identifies a matching case. Because ch is 2
We use case 2
Thus the following line at the top is printed.
Then automatically breaks the function, so we don’t continue.
4 0
2 years ago
What are the uses of the tracrt and ping commands and what information is provided by each.
ikadub [295]

Answer:

The ping command is used to test the ability of a source computer to reach a specified destination computer. This command is used to verify if the sender computer can communicate with another computer or network device in the network.

The tracert command is used to show the details about the path sending a packet from the computer to whatever destination you specify.

6 0
3 years ago
Before your shell forks a new process to call execvp(), it should parse the input string and separate it into a collection of su
kompoz [17]

Answer:

#define LSH_RL_BUFSIZE 1024

char *lsh_read_line(void)

{

int bufsize = LSH_RL_BUFSIZE;

int position = 0;

char buffer = malloc(sizeof(char) bufsize);

int c;

if (!buffer) {

   fprintf(stderr, "lsh: allocation error\n");

   exit(EXIT_FAILURE);

}

while (1) {

   // Read a character

   c = getchar();

   // If we hit EOF, replace it with a null character and return.

   if (c == EOF || c == '\n') {

     buffer[position] = '\0';

     return buffer;

   } else {

     buffer[position] = c;

   }

   position++;

   // If we have exceeded the buffer, reallocate.

   if (position >= bufsize) {

     bufsize += LSH_RL_BUFSIZE;

     buffer = realloc(buffer, bufsize);

     if (!buffer) {

       fprintf(stderr, "lsh: allocation error\n");

       exit(EXIT_FAILURE);

     }

   }

}

}

Explanation:

3 0
3 years ago
Other questions:
  • Which of the following are potential drawbacks to the Internet in regard to politics? Select all that apply. Overexposure of can
    10·2 answers
  • Define scanning and why it’s considered one of the most important phases of intelligence gathering for an attacker. Also discuss
    10·1 answer
  • Which Internet security risk is associated with dumpster diving?
    15·2 answers
  • What command would you use to map a share to a drive letter on a computer?
    7·1 answer
  • What controls network connectivity such as Wi-Fi and the GPS locator in a mobile device?
    8·1 answer
  • What is jcl language on the mainframe?
    10·1 answer
  • Suppose L is a LIST and p, q, and r are positions. As a function of n, the length of list L, determine how many times the functi
    8·1 answer
  • _____ is a method of computing that delivers secure, private, and reliable computing experiences based on sound business practic
    7·1 answer
  • SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick R
    9·1 answer
  • Simple question: what is bandwidth?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!