1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
telo118 [61]
3 years ago
12

Which tab should be selected to add a hyperlink within a cell? Home tab Review tab Insert tab Formula tab

Computers and Technology
2 answers:
Mashcka [7]3 years ago
6 0

Answer:

On the Insert tab

Explanation:

  1. You would select the tab that you want the Hyperlink to be in
  2. select the <em>Insert tab</em>
  3. There you will see a panel that says<em> link</em> press the down arrow than you will see a section that says <em>link</em> again there again you will press the down arrow which will show a option of document you want to add if your looking to add a link form a web browser than at the bottom of the list you will see <em>Insert Link</em>
  4. From there you will see a box pops up there you can upload a file from your computer or PC
  5. Once the box pops up you will enter the web browser page address in the box that says <em>address</em>
  6. From there press <em>okay</em> then your hyperlink will be in the cell you want
  7. If you don't know where or what a web browser address is than on the top of the web browser where you would insert what you are searching all you have to do is press it and it will automatically highlight the text than copy and paste the text by holding <em>Ctrl + C </em>to copy and holding <em>Ctrl + V </em>to paste

Helen [10]3 years ago
4 0

Answer:

insert tab

Explanation:

edge 2020

You might be interested in
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
3 years ago
The _______ displays the name of the open file and the program.
Svetlanka [38]
The answer is a. Title Bar

The Title Bar displays the name of the program and the name of the current open file, whether it is just displayed or being edited. It is located at the top of the program window.
3 0
4 years ago
Michael a programmer, is writing an algorithm to solve programming problems, Guide him to write an algorithm
Nadusha1986 [10]

Answer:

Algorithms need to be simple, factual, and explained in simple but relevant vocabulary, and must be step by step, and none of the step should be missing.

Hence, first you need to understand the requirement, which can be yours or your clients.

Then consider each module of the problem, and separate each of them from the others. Now, understand the relationship between each module. And then you need to understand how you can combine them in one algorithm.

Also remember, the modules are functions. and various functions combine together to form an algorithm. We can have separate algorithms for each module as well, and then you can combine them together in right continuity to form the one single program.

Also, a project can have a loads of programs with other parts like images and various other assets and technologies.

However, everything starts with algorithms. And if are good at explaining, and a sound vocabulary, plus can explain the process well, you can explain the process well, and write a good algorithm definitely. Learn languages like Python, C, and C++  to start with, and then continue with Java, R etc. Remember we still uses functional programming as well like through Haskell etc.

The below is an example of sample algorithm. John wants to check what Ana has brought for him.

Step 1: Ana arrives with meat, which can be of goat or chicken

Step 2: John: Hi Ana

Step3: Yes John

Step 4 What meat is that Ana

Step 5: Goat

Step 7: Thanks Ana for Bringng Goat Meat

Step 8: Stop

In the above algorithm John confirms that what meat Ana has brought for him. And he comes to know She has bought Goat meat. This is the simplest of algorithm with no loop. And the complexity can be increased to any level.

Explanation:

The Answer is self explanatory, and has all that is required.

7 0
3 years ago
Read 2 more answers
What OC level is primarily used as a regional isp backbone, and occasionally by very large hospitals, universities, or other maj
Neporo4naja [7]

The OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises is <u>OC-48.</u>

<u></u>

<h3>What is the greatest amount of throughput provided by an OC 12?</h3>

OC-12 is a network line with communication speeds of up to 622.08 Mbit/s (payload: 601.344 Mbit/s; overhead: 20.736 Mbit/s). OC-12 lines are generally used by ISPs as wide area network (WAN) connections.

<h3>When using frame relay What is the appellation of the identifier?</h3>

A data-link connection identifier (DLCI) determines the Frame Relay PVC. Frames are routed through one or more virtual circuits determined by DLCIs.

Each DLCI has a permanently configured switching path to a particular destination

To learn more about OC level , refer

brainly.com/question/25899244

#SPJ4

<u></u>

5 0
2 years ago
Why was the microchip essential to improving computers?
-BARSIC- [3]
Because it downsized the scale of the computer itself.

5 0
3 years ago
Other questions:
  • THE DOMAIN IN AN EMAIL MESSAGE TELLS YOU THE
    11·1 answer
  • Which logging category does not appear in event viewer by default?
    11·1 answer
  • All but one of the following statements about stored procedures is true. Which one is false? a. They consist of one or more SQL
    10·1 answer
  • The unique physical address burned into every network interface card is its:
    15·1 answer
  • If involved in a boating accident causing serious bodily injury or death while boating under the influence, the operator has com
    15·1 answer
  • Which describes the first step a crawler-based search engine uses to find information?
    10·2 answers
  • What type of memory or storage device is prone to losing data if the power goes out?
    5·1 answer
  • There are some processes that need to be executed. Amount of a load that process causes on a server that runs it, is being repre
    7·1 answer
  • Cybersquatters:_________.
    5·1 answer
  • How does Virtual Reality help to make work experiences more inclusive?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!