1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
4 years ago
15

Dr. Joon asks her students how to insert a table in an Excel workbook. The students record the steps a chart. Which students lis

ted the correct steps?
A: Talia and Roni

B: Adi and Hila

C: Roni and Hila

D: Talia and Adi

Computers and Technology
1 answer:
Leona [35]4 years ago
4 0

Answer:

C

Explanation:

Both Table and Format as Table can be used to create a table

You might be interested in
A software development company wants to reorganize its office so that managers and the Computer Programmers they supervise can b
Lelechka [254]

The best way to increase collaboration between a supervisor and her or his subordinates, which in this case is the computer programmers, would be through option (A) remove the private offices and cubicles and replace them with large desks and conference tables out in the open.

By choosing to implement an open office layout, greater communication between the supervisor and computer programmers would occur compared to when they were separated.

7 0
3 years ago
I am the biggest and most important part of data storage hardware. I am about the size of a small book and store critical things
inn [45]

Answer:

HDD (Hard drive disk) or SSD (Solid state drive)

Explanation:

8 0
2 years ago
What does the % find?
-BARSIC- [3]
It finds a AMOUNT or percentage of a number.

You find this by multiplying or dividing.
3 0
3 years ago
Read 2 more answers
Which of the following policy guidelines specifies the restrictions on user access
Levart [38]

The policy guidelines that specifies such restrictions on user access can be referred to as: A. Least privilege.

<h3>What is the Least Privilege Principle?</h3>

The least privilege principle can be described as a concept in information security and policy guidelines that gives a user minimum permission or levels of access that they are needed to execute a tasks.

Therefore, the policy guidelines that specifies such restrictions on user access can be referred to as: A. Least privilege.

Learn more about least privilege on:

brainly.com/question/4365850

6 0
3 years ago
A firm is assigned the network part 133.44. It selects an 12-bit subnet part. Note that this is not on an octet (8-bit boundary)
Andreas93 [3]

Answer:

Hello the options to your question are missing here are the options

a. 1022

b. 62

c .14

d. None of the above

Answer : None of the above ( d )

Explanation:

A firm is assigned the network part 133.44. It selects an 12-bit subnet part.  The number of  hosts  possible are

= 2^{12}   - 2

= 4094

Note : Subnetting is a technique that lets network administrators use the 32 bits available but  the actual host ID portion of the subnetted address is 12 bits in length.

5 0
4 years ago
Other questions:
  • I want to know all the part of computer system
    14·1 answer
  • Individuals with desirable traits will be __________ to have young that survive than individuals without these traits. (2 points
    5·2 answers
  • Which statement is correct? (Note: Our selectionsort picks largest items first.) A. The algorithm might be either selectionsort
    9·1 answer
  • __________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
    9·1 answer
  • 10. A loop statement is given as:
    7·1 answer
  • Why does the randomNumber function only use whole numbers between 0 and 1 (basically, 0 and 1)?
    13·1 answer
  • A retailer is able to track which products draw the most attention from its customers through the use of 5g-enabled motion senso
    5·1 answer
  • Please help
    5·1 answer
  • Terrel is designing and maintaining a web page for a local company. In which career pathways would Terrel be involved?
    9·1 answer
  • Which of the following terms refers to the area of the hard drive used for virtual memory?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!