1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Damm [24]
4 years ago
12

Jim maintains attendance records for his employees for the year row B includes the dates of attendance and columns A includes th

e names of the employees he wants to lock row B so that he can scroll the entire worksheet but keep roe B visible which option should he use
Computers and Technology
1 answer:
never [62]4 years ago
3 0

lock:row\A

set:row\b

this is the correct answer

You might be interested in
. Describe a way to simplify a complex problem.
Inga [223]

Answer:

Simplify a complex problem means reduces its complexity and make it easy to understand. When we make the problem simplified then, the data become more clear and understandable.

There are many ways to simplify a complex problem as follows:

  • Organize the information and content properly and reduces the layers of complexity. Organized the content in the form of steps so that it become easy to understand.
  • Use of clear language is one of the most important part to make the content more clear and use proper formatting of the data.
  • Break the information into smaller parts to it can easy to read and looks more clearly. So, the reader finds it more comfortable and efficient.

5 0
3 years ago
Pleeeese help me for these questions
geniusboy [140]

1 Account

2 online

3 access

4 password

5 internet

6 email

4 0
3 years ago
Ethics issues are significant in the area of online privacy because laws have not kept pace with the growth of the Internet and
raketka [301]

Answer:

The answer is "True"

Explanation:

In the given statement some information is missing that is "True or false"

Internet security is the scope of the privacy and security of the electronic exchange of data. It's a common term that refers to something like many factors, technologies, and technology used to protect records, contact, and interests, confidential and private.

  • The security of the Internet is recognized as the privacy of the User.
  • It is secure and unique passphrases or two-factor authentication.
7 0
3 years ago
What percent<br> of students in<br> the US are<br> considered<br> ESL<br> students?
mariarad [96]

Answer: 9.5%

Explanation: There were nearly 5 million English language learners in U.S. public schools in fall 2015, according to the most recent available data from the National Center for Education Statistics. This represented 9.5% of U.S. public school enrollees, an increase from 8.1% in 2000

5 0
3 years ago
If you must transmit a file over an insecure channel, one way to prevent its contents from being seen by someone who might inter
natali 33 [55]

Answer:

connect to the network from a remote location using a VPN.

Explanation:

VPN stands for virtual private network, it allows computers to establish a secure connection through an encrypted tunnel for exchanging data between two end points when communicating through insecure channels like the internet.

8 0
3 years ago
Other questions:
  • The front surface of the CCD is called the _________
    11·1 answer
  • Checking tire pressure should be performed:
    11·2 answers
  • Consider the following method:
    8·2 answers
  • Your organization wants to implement a 5-year rotation plan for all of its computing devices. What percentage of the computer fl
    10·2 answers
  • An instruction book or program that takes users through a prescribed series of steps to learn how to use a program is called (a)
    10·1 answer
  • AYUDAAAA!!!!! URGENTE!!!!!!1<br> ¿para que sirve la "BIG DATA"?
    9·1 answer
  • Why is science, mathematics, and technology different from engineering?
    15·1 answer
  • Where in PowerPoint should a user navigate to complete the tasks listed below?
    6·1 answer
  • Laptops are used for accessing the internet. Name two advantages and two disadvantages for using a laptop rather than a smartpho
    5·2 answers
  • What happens if an email server cannot find a matching username or the mailbox is full
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!