1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olchik [2.2K]
3 years ago
13

You would use the _______ conditional formatting options when analyzing a worksheet in which you want to highlight the highest o

r lowest values compared to other cells in the selection.
Computers and Technology
1 answer:
nirvana33 [79]3 years ago
4 0

Answer:

Top/bottom conditional formatting

Explanation:

The top/bottom conditional formatting automatically carries out the task of finding the highest, lowest and even average values.

Conditional formatting formatting gives one the opportunity to enhance reports and dashboards as they work on excel.

You use the too/bottom formatting to highlight cells whose values of highest in a dataset and lowest in a dataset

You might be interested in
A disadvantage of using hydroelectric power is:
siniylev [52]
Hydroelectric power doesn't pollute water or add anything to it,
it doesn't use wind for its operation, and it doesn't emit anything
into the air.   It does, however, disrupt the river ecosystem.
3 0
4 years ago
1. How does the computer take data and information ?​
aniked [119]

Answer:

Data processing, Manipulation of data by a computer. It includes the conversion of raw data to machine-readable form, flow of data through the CPU and memory to output devices, and formatting or transformation of output. Any use of computers to perform defined operations on data can be included under data processing.  Input devices accept data in a form that the computer can use; they then send the data to the processing unit. The processor, more formally known as the central processing unit (CPU), has the electronic circuitry that manipulates input data into the information people want.

Explanation:

6 0
3 years ago
Create a program that can be used to add two integers together. In the beginning, the user is asked to give two integers that ar
Gnesinka [82]

Answer:

Answer written in python.

Explanation:

#ask user for the first integer.

first_number = int(input("enter first number: "))

#ask user for the second integer

second_number = int(input("enter second number: "))

#add both and store in a variable, result.

result = first_number + second_number

#print out the result

print ( f"the answer to the problem is {result} calculated by adding {first_number} to {second_number}")

The worded lines after the # sign are called comments and are used to describe what the following lines of code does making it easier to read and understand by other programmers or by the same programmer coming back to it after a while.

3 0
3 years ago
When an attacker attempts to gain access to a user's computer by stealing the encrypted file containing the password hash that w
-Dominant- [34]
Correct answer: Offline cracking

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach (brute-force attack) is to try guesses repeatedly for the password and check them against an available cryptographic hash of the password.

The purpose of password cracking might be to help a user recover a forgotten password (installing an entirely new password is less of a security risk, but it involves System Administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by-file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.

5 0
4 years ago
In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away.
Svetradugi [14.3K]
100 miles i assume since the avarge antanna cover 5-50 miles
3 0
3 years ago
Other questions:
  • List and describe two of the four generally recognized security positions.
    6·1 answer
  • John, the network administrator of XYZ Corporation, is interested in changing the format of text from the American Standard Code
    10·1 answer
  • Describe the difference between cellular, wi-fi and wired networks.
    8·1 answer
  • What is the difference between a heap (a minheap) and a binary search tree?
    12·1 answer
  • Mark is the network administrator in his building and is responsible for training all the new technicians on various troubleshoo
    7·1 answer
  • A T-1 system multiplexes ___ into each frame
    10·1 answer
  • 1. (1 pt) Suppose you wish to run a program P with 37.5 x 109instructions on a 15 GHz machine with a CPI of 0.75. What is the ex
    9·1 answer
  • Select the correct locations on the image. Adrian wants to delve into database administration. Which certifications would help h
    5·1 answer
  • Which item is developed last in the cyclical design process
    11·1 answer
  • What year was html released?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!