1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
15

Mrs. Dunn shows her students a data range, which has been named "Goals," covering cells A14 to A25. She tells her students that

the data range needs to expand to include additional cells. The range should cover A14 to A45. She tells her students to record the steps needed to extend the range, as shown in the chart.
Computers and Technology
1 answer:
Butoxors [25]3 years ago
3 0

Answer:

Hina and Riko; the dialog box is inside the Name Manager group, and it allows the user to manually type in the additional cells or select the cells after clicking the collapse button.

You might be interested in
Anyone free to inbox me plz....​
MArishka [77]

Answer:

To message you? Here is my alt number (240-918-2355) you can text me if you want ¯\_(ツ)_/¯

8 0
3 years ago
Read 2 more answers
Application software can run without the presence of system software true or false ​
sesenic [268]

Answer:

false

...........

.....

8 0
3 years ago
The advancements in which of the following technologies has most changed the American job market in recent years?
vodka [1.7K]

Answer:

Manufacturing mostly

7 0
3 years ago
Read 2 more answers
Once the data center routes to the destination server that hosts the website, whats the next step in the internet process?
Pavlova-9 [17]

User’s browser renders HTML code from destination server into web page

4 0
3 years ago
Leah’s computer is connected to the network most of the time. Once, she noticed few of her files with sensitive data were missin
vivado [14]

Answer:

The Firewall (Router) is the vulnerable hardware.

Explanation:

The entry into the network will be the firewall (If there is a firewall installed on the network), if this medium is compromised, every workstation on the network will be vulnerable.

3 0
3 years ago
Other questions:
  • In what way(s) did the password you tried to use not meet the password policy requirements?
    14·1 answer
  • 60 POINTS!
    13·1 answer
  • A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and stor
    9·1 answer
  • When entering a expressway using a weave lane you must do what
    7·1 answer
  • Will give brainliest!!<br> (Question 3)
    12·2 answers
  • What is the awnser ?
    11·1 answer
  • What makes these Pokémon special?
    9·2 answers
  • Who is tim berners-lee
    14·2 answers
  • Creating a Numpy Array
    5·1 answer
  • "code is broken down by the computer until it is in _____and is a very long series of ons and offs
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!