1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
5

2. Select the things you can do when working with rows in columns in a spreadsheet:

Computers and Technology
1 answer:
Kay [80]3 years ago
5 0
I think you can do all of those things to rows and columns when working with a spreadsheet.
You might be interested in
Lukas entered the date 9-17-2013 in an Excel workbook. He wants the date to appears as “Tuesday, September 17, 2013.” Instead of
Sphinxa [80]
<span>The answer is highlight cells, select the Insert tab, click on the number, select Date from the category box, highlight the correct format, and click OK.</span>
8 0
3 years ago
Differentiate Between<br>Master file and transaction file<br>​
Ray Of Light [21]

Answer: money

Explanation: money is life and the air is fat is full of fart

5 0
2 years ago
Read 2 more answers
Indicate if the following statements are True or False. Statement Circle one Internet Service Providers (ISPs) are proprietary n
Artyom0805 [142]

Answer:

False

Explanation:

Proprietary networks are those that are privately and exclusively managed, controlled and even owned by some organizations.

Internet Service Providers (ISPs) are companies that provide internet access services to companies and consumer products. They allow devices to connect to the internet. They offer much more than just internet access. They also offer related services such as email access, web development and virtual hosting.

ISPs can be open source or proprietary. They could be owned by a community, a firm and even non-profit organizations.

5 0
3 years ago
The function below tries to create a list of integers by reading them from a file. The file is expected to have a single integer
Setler [38]

Answer:

Check the explanation

Explanation:

def get_list_of_integers_from_file(filename):

int_list=[]

for line in open(filename).readlines():

try:

int_list.append(int(line))

except:

continue

return int_list

print(get_list_of_integers_from_file('file.txt'))

 

File.txt:

Kindly check the output below.

4 0
3 years ago
Part of implementing Ken 7 Windows Limited new enterprise resource planning (ERP) software is ensuring all workstations and serv
spayn [35]

Answer:

Explanation:

1) The Functions a software application provide to keep a web browser secured includes:

a) The web browser should always be updated, you can keep it on "automatic update" option enable on your browser settings so that it will be automatically updated whenever the browser gets an update.

b) Always keep the third party cookies disabled because of the many unauthorized and phishing sites over the internet. This leaves the browser unsafe and cause higher security risk so block all the third party sites and cookies from the browser.

2) The Functions a software application prohibit to keep a web browser secured includes:

a) Do not store passwords on your web browser, deny the "store password" option on your browser settings. This is very important Even if you store passwords on your web browser do set a very strong master password to access all the stored passwords.

b) Don't ever click on unwanted and unknown hyperlinks. There will be many unsolicited attachments, files, etc over the internet please do not open or download it unnecessarily.

3) The functions a software application should provide to keep a web server secured includes:

a) Always using an application scanner. Whenever you install or download any new applications, scan the application before accessing it or opening it.

b) Install all the security patches to keep off hackers as they are many on the internet.

4) The Functions a software application should prohibit to keep a web server secured includes:

1) Uninstall an application that has not been used for long time, because they are actually of no use.

b) There may be scripts, files, setups, codes stored on the web server unknowingly so do check it and delete all the sample scripts, files and codes from the web server.

3 0
3 years ago
Other questions:
  • . Alex discovered a bunch of SATA drives in a box at the office and needs to check the contents. What can he do so that Windows
    13·1 answer
  • Which Game Is Better &amp; Favorite For You?
    12·2 answers
  • HELP ASAP U GET BRAINLIEST
    15·2 answers
  • Write a program that continually prompts the user for an integer input until input is entered that is less than 0. Each input th
    9·1 answer
  • I forgot to tell it’s on Roblox for those who play and wanted to be friends and new ppl username is mosarider489
    9·2 answers
  • All of the following are ways to save money on transportation except :
    7·1 answer
  • What is a WYSIWYG program?
    10·2 answers
  • How to format the selected range of cells as u.s currency
    6·1 answer
  • Explain the<br>4 ways<br><br>ways of arranging icons.<br><br>​
    6·1 answer
  • Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a tr
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!