1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Komok [63]
3 years ago
14

Which of the following would you use to search a table in Excel?

Computers and Technology
2 answers:
Sladkaya [172]3 years ago
6 0

Answer:

C. Find And Select

Explanation:

I hope this help you

snow_tiger [21]3 years ago
3 0

Answer:

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are empty</em>

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are emptya COUNT</em>

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are emptya COUNTb. COUNTA</em>

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are emptya COUNTb. COUNTAc. COUNTBLANK</em>

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are emptya COUNTb. COUNTAc. COUNTBLANKd. COUNTVALUES</em>

You might be interested in
How could you fact check a news report that you saw on television
Phoenix [80]
I would have to say D) because they know the real answer.

5 0
3 years ago
Two categories of payroll deductions are required deductions and ___ deductions.
alukav5142 [94]

Answer:

1.)

- C.) Optional

2.)

- D.) Short-term Notes Payable

3.)

- A.) Payroll Sinking Funds

4.)

- A.) A Formal Timekeeping System Is Used

(I'm possibly wrong on the last question, if so then my apologies and I wish you the best of luck.)

3 0
3 years ago
Read 2 more answers
Which of the following kinds of computing refers to an environment of servers that house and provide access to resources users a
AveGali [126]

Answer:

Cloud is the correct answer for the above question.

Explanation:

Missing Information:

    The option is missing in the question and the question suggests to choice. The option can be liberated, cloud, disperse, digital for this question in which cloud is the correct answer.

Detailed Explanation:

  • The cloud is used to store a large amount of data or information for varies users and anyone can store or modify or delete the information from anywhere.
  • This service takes money from the user and gives service to modify, edit or add the data from anywhere using the internet. When a user wants to take the service of the cloud then he needs to contact the cloud service provider, then pays money to them and then he can enjoy the service.
  • The above question wants to ask about the term which is a vast environment of databases that provide access to the users to store and mane the data and that is the cloud which is the correct answer for the above question.
7 0
3 years ago
Can someone plss help me!!
REY [17]

Answer:

HTML elements are delineated by tags, written using angle brackets.

Explanation:

Tags such as <img /> and <input /> directly introduce content into the page.

8 0
3 years ago
Kristine has been receiving many emails from a certain address. She thinks that these emails might harm her computer. Which acti
Paraphin [41]
Report the email adress then block them 
6 0
3 years ago
Read 2 more answers
Other questions:
  • I just started game development using unity, I’m trying to control my sphere moving on a flat surface using the W,A,S,D keys, if
    5·1 answer
  • What process combines data from a list with the content of a document to provide personalized documents?
    9·2 answers
  • A key field is used to _____. enter a password uniquely identify records merge data list the most important information
    12·2 answers
  • What is the main characteristic of a Peer-to-Peer (P2P) network?
    8·1 answer
  • The ____ algorithm was the first public key encryption algorithm developed (in 1977 and published for commercial use.
    8·1 answer
  • How does a layered pattern make use of abstraction and encapsulation?
    10·1 answer
  • Sorting table rows is based on the data in the selected        A. cell range.   B. cell.   C. column.   D. row.
    12·2 answers
  • After clicking the Start button on your computer screen desktop, what option would you then select to examine system components
    15·1 answer
  • Plato Web Tech B Semester Test- I'll mark brainiest for answers to ALL
    9·1 answer
  • Why do my airpods keep disconnecting from my laptop
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!