1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
5

2. Select the things you can do when working with rows in columns in a spreadsheet:

Computers and Technology
1 answer:
Kay [80]3 years ago
5 0
I think you can do all of those things to rows and columns when working with a spreadsheet.
You might be interested in
The "origin" of the cartesian plane in math is the point where x and y are both zero. Given a variable, origin of type Point-- a
Sergeeva-Olga [200]

Answer:

  1. #include <iostream>
  2. using namespace std;
  3. struct Point{
  4.    double x;
  5.    double y;
  6. };
  7. int main()
  8. {
  9.    Point origin;
  10.    origin.x = 0;
  11.    origin.y = 0;
  12.    return 0;
  13. }

Explanation:

The solution code is written in C++.

Firstly, we create a data structure Point with two fields, x and y (Line 5 -8).

In the main program, declare an origin object with Point type (Line 12).

Set the x and y fields of origin object to zero using dot syntax (Line 13-14).

3 0
4 years ago
What happens when you position the mouse cursor over an edge or corner of a bounding box that has sizing handles?
bezimeni [28]

Answer:

The cursor changes to a two edged arrow pointer and the bounding box is highlighted.

Explanation:

Bounding boxes in windows operating system is a boundary line of the windows box that run that runs applications and other utilities in the system. A sizing handle is a tool used in place of a the minimize and maximize button on top of the windows box. It is found on the bottom right edge of the windows box.

When a cursor points to the sizing handle, the cursor changes to a double edge arrow pointer and the bounding box is highlighted, and can be resized on the screen.

7 0
3 years ago
Read 2 more answers
When can we feel electricity?? Tell me the volt
inna [77]
Well, if you were to rub your hair on a balloon, or your feet on the ground, static starts to build up. Static is a form of electricity.
7 0
4 years ago
Which city is the largest within the Andean and midlatitude countries? A. Buenos Aires, Argentina B. La Paz, Bolivia C. Santiago
Westkost [7]
My best guess would be either B. or C. 
Hope I helped:)
8 0
3 years ago
Read 2 more answers
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes
lisabon 2012 [21]

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

8 0
3 years ago
Other questions:
  • Elsa has collated information for a meeting using Excel. Due to certain developments, some of the data in her worksheet is now r
    6·1 answer
  • Plane eyes I don't know
    9·1 answer
  • which of the following is an educated or informed guess that is proposed and supported with verifiable evidence
    12·1 answer
  • Complex communication skills will probably never be outsourced to a computer because they require the human touch.
    8·1 answer
  • Citing the recent increase in earnings by several computer companies, economists feel that a cycle has begun in which personal c
    13·1 answer
  • CodeHS 3.4.5. What is the code for four colored triangles.
    8·1 answer
  • Class members are accessed via the ____(1)_____ operator in conjunction with the name of an object of the class, or via the ___(
    6·1 answer
  • The first step when entering data is _
    6·1 answer
  • Input 3 positive integers from the terminal, determine if tlrey are valid sides of a triangle. If the sides do form a valid tria
    6·1 answer
  • One rule in the Java programming language is that you have to place a semicolon at the end of each statement. What is this rule
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!