1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreev551 [17]
3 years ago
7

This is used to copy information from cell to cell in the spread sheet

Computers and Technology
1 answer:
Kryger [21]3 years ago
5 0

Answer:

D. Fill handle

Explanation:

Required

Which can be used to copy from cell to cell

(a); Means the current cell being selected in the spreadsheet program

(b): Used to fit all columns in the spreadsheet program. Usually, the columns are fitted based on their width.

(c): The vertical and horizontal lines that separate cells.

(d): This is used to copy from one cell to another, especially adjacent cells.

You might be interested in
Torque is defined as _____.
BlackZzzverrR [31]
<span>something that produces or tends to produce torsion or rotation; the moment of a force or system of forces tending to cause rotation.

</span>
5 0
3 years ago
Why do attackers tend to target public or private Wi-fi networks?
Anika [276]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

A free WiFi connection in a public space can seem like a lifesaver when you are on the go.But if you decide to use public WiFi just be aware that you could be making yourself an easy target for hackers and putting your information and more at risk.

one of the dangers of using a public WiFi network is that data over this type of open  connection is often encrypted and  unsecured ,leaving you vulnerable to a man in the middle attack.It when a cyber criminal exploits a security  flaw in the network to intercept data

  • Avoid connecting to public WiFi connection. i if you must use a public WiFi hotpots also use a virtual privater network to secure your connection.
  • Do not  log in to password protected websites that contains sensitive information when using a public WiFi connection for example banking and social networking sites or even email.
  • Keep your software patched and up to date and all your devices even your mobiles ones to avoid any potential infection by viruses or malware if you do use unsecured public WiFi.

5 0
3 years ago
David is taking a test. To answer a question, he first covers up the answer choices. Next, he tries to answer the question. Then
lakkis [162]

Answer:

Multiple choice

Explanation:

I got 100 on the assignment

3 0
2 years ago
Read 2 more answers
A deluxe meal, represented by a DeluxeMeal object, includes a side dish and a drink for an additional cost of $3. The DeluxeMeal
STALIN [3.7K]

Answer:

DeluxeMeal burritoCombo = new DeluxeMeal ("burrito", "chips", "Lemonade", 7.49);

Explanation:

The above statement will be inserted in the software and the result will show the Deluxe meal details such as burrito which is an entrée, chips are side dish and lemonade is a drink. The cost of single burrito is 7.49 so with the meal the cost will be $3 higher which means the total cost will be $10.49

4 0
3 years ago
Where do today's computers store almost all motherboard configuration data?
sergij07 [2.7K]
In the mother board of the back door next to the restroom 5 steps left
3 0
3 years ago
Other questions:
  • Why ois my printer not printing pictjures?
    9·1 answer
  • What is the solubility of an empty soda can
    10·1 answer
  • Ruby is creating a presentation. She wants each slide displayed at intervals of five seconds. Which feature in the presentation
    6·2 answers
  • To create a pull quote, how should a user format the text?
    6·2 answers
  • If you have an equipment failure while driving on an expressway, you should
    8·1 answer
  • The first numerical control machine tool was demonstrated in 1952 in the United States at the Massachusetts Institute of Technol
    14·1 answer
  • Software and technology that allow people to work together on a task are known as
    8·2 answers
  • You wrote a program to allow to guess a number chosen randomly.
    10·2 answers
  • You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What i
    12·1 answer
  • EMERGENCY- I am giving 55 points for this, please help. WITH working out
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!