1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
8

Which formatting option(s) can be set for Conditional Formatting rules?

Computers and Technology
2 answers:
viktelen [127]3 years ago
5 0
D - any of these formatting options as well as number, border, shading, and font formatting can be set
ehidna [41]3 years ago
3 0

Answer: D is the answer

You might be interested in
Since the 1960s, there have been five major generations, or cycles, of computing. Which represents those generations in order?
sergiy2304 [10]

Answer:a) Mainframes, miniframes, PCs, desktop Internet computing, mobile computing

Explanation: The hierarchy of the computers or computing are in the generation is:-

  • Mainframe:-designed for the execution of huge data processing , storage and execution.
  • Miniframe:-has similar functioning as the mainframe but on smaller scale and version.
  • Personal computer(PC):-It is designed for the individual purpose and according the need of the user.
  • Mobile computing:-computing that can be done on the mobile phone similar to the computing on the personal computer
  • Internet computing:-the computing of the mobile and computer system with the facility of the internet connectivity.

7 0
3 years ago
3X5
yan [13]

Answer:

15

Explanation:

cause when you multiply three by five it will give u 15

7 0
2 years ago
How are you doing this fine morning <br><br> hi
notka56 [123]
It's evening................∆
6 0
3 years ago
Read 2 more answers
What type would the object X be in the following statement:
Y_Kistochka [10]

Answer:

Boolean

Explanation:

If statement condition always returns true or false,which is a boolean data type.

X is true or false

it maybe a variable or an expression.

5 0
3 years ago
Read 2 more answers
An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a se
strojnjashka [21]
Brute force. He's not using any information to mathematically derive information about the key, just trying all possibilities. With modern key sizes this is typically not a successful approach.
8 0
3 years ago
Other questions:
  • ________ are hardware devices or software programs that direct messages as they travel between networks.
    15·1 answer
  • Tom is the aerobics coordinator at a fitness center. He needs a more efficient way for his instructors to share information. Cla
    13·2 answers
  • What's a sentence with the words trickle and resume in it? they can be in any tense. Thanku​
    5·1 answer
  • Problem 3. Consider the following recurrence, defined for n a power of 4 (for the time of some algorithm): T(n) = 3 if n = 1 2T(
    5·1 answer
  • If I wished to insert a hyperlink from text in my document to my company website, what type of link would I insert?
    9·1 answer
  • Which element appears within the top margin of the document but does not form the part of the body of the text?
    15·1 answer
  • Which question can most help a writer revise an argumentative essay?
    9·2 answers
  • Do u have all the subjects​
    12·2 answers
  • How do you delete questions you asked?
    7·2 answers
  • POINT BOOST:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!