1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sloan [31]
4 years ago
7

Lucy has to move data from column A to column N in a worksheet. Which keys should she select to move data in the same worksheet?

A. Select the source cell, press Ctrl + C, select the target cell, and then press Ctrl + V. B. Select the source cell, press Ctrl + X, press Ctrl + V, and then select the target cell. C. Select the source cell, press Ctrl + X, select the target cell, and then press Ctrl + V. D. Select the source cell, press Ctrl + S, select the target cell, and then press Ctrl + X.
Computers and Technology
2 answers:
UkoKoshka [18]4 years ago
8 0
C. Select the source cell, press Ctrl + X, select the target cell, and then press Ctrl + V.
vovangra [49]4 years ago
7 0

Answer:

C. Select the source cell, press Ctrl + X, select the target cell, and then press Ctrl + V.

Explanation:

To move data from column A to column N you have to:

  • Select the source cells at column A
  • Cut the selected cells pressing Ctrl + X, that is, pressing Ctrl and X at the same time
  • Select the target cells at column N
  • Paste the selected cells pressing Ctrl + V, that is, pressing Ctrl and V at the same time

You might be interested in
When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. B
jeka94

Answer:

Because reusing the old passwords possess security threats.

Explanation:

A password can be defined as a string of characters or words or phrases that are used to authenticate the identity of the user. It is also known as passcode and should be kept confidential. A password is used to access constricted systems, applications, etc.

A password or passcode is usually composed of alphabets, numbers, symbols, characters, alphanumeric, or a combination of these.

<u>In the given case, Judy was not able to change her passcode to the previous one because reusing old passwords is prohibited in any sites or systems. A system denies the user to reuse the old passwords for various reasons but most importantly due to security reasons. Though it is said that old passwords can be used after 100 times but seldom someone changes a password that much. All systems care for the security of their users thus they deny reusing old passcodes.</u>

6 0
3 years ago
A type of SDLC in which each phase has results that flow into the next phase is called the __________ model.
vovangra [49]
Answer : a type of SCLC in which each phase has results that flow into the next phase is called the waterfall model. Hope that helps (:
7 0
3 years ago
You are working on a graphical app, which includes multiple different shapes. The given code declares a base Shape class with an
ycow [4]

Answer:

maybe

Explanation:

5 0
3 years ago
LEARNING TASK 3 about: REAMING THE RIGID STEEL CONDUIT.
devlian [24]

Answer:

1.I have learned that my teacher is a good teacher

2.I have realized that my name is beautiful

Explanation:

thats right? hope it's help you heart me and please give brainlesst

3 0
3 years ago
You listened to a song on your computer. did you use hardware or software? explain.
scZoUnD [109]
Software, unless you planned on permanently downloading the Music Album or Song to your computer's Hard Drive. i.e, you would use whatever Music or Media player you have installed on your computer, and that simply counts as Software. 
4 0
3 years ago
Other questions:
  • I would A lot of knowledge and education for computers and <br> Technology
    10·2 answers
  • Each tab is divided into groups of related commands or buttons. T or F
    10·1 answer
  • In ancient times what did kings and tribals chiefs use to communicate
    10·1 answer
  • What is a good safety precaution to take when opening a computer case?
    9·1 answer
  • A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
    8·1 answer
  • Write an expression that computes the integer average of the int variables exam1 and exam2 (both declared and assigned values).
    15·1 answer
  • Recently, Walmart offered a wireless data contract based on bandwidth used, with a minimum monthly charge of $42 for up to 5 gig
    15·1 answer
  • Different between input and output device​
    5·1 answer
  • 9. Which of the following is considered an interface? (1 point)
    11·1 answer
  • Ten ways ict has helped in social development
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!