1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xz_007 [3.2K]
3 years ago
5

After selecting a cell in the data range, what are some ways to create a table? Check all that apply.

Computers and Technology
2 answers:
lana66690 [7]3 years ago
3 0

Answer: the answer is B /E

velikii [3]3 years ago
3 0

Answer:

b , e

Explanation:

got it right on edge

You might be interested in
Explain briefly what would happen if marketing research is not conducted before a product is developed and produced for sale.
andreyandreev [35.5K]

Neglecting to do market research can result in indecision and inaction, fear of risk or the truth, and/or too many options, which can lead to paralysis. ... When launching a new product, effective market research will help you narrow down your true market potential and your most likely customers.

6 0
4 years ago
What is it called when two different files generate the same hashing result?
IrinaK [193]
A Hash<span> Collision Attack is an attempt to find </span>two<span> input strings of a </span>hash<span> function that </span>produce the same hash result<span>. ... If </span>two separate<span> inputs </span>produce the same hash<span> output, it is </span>called<span> a collision. </span>
4 0
3 years ago
How much weeks are in one year ​
LiRa [457]
There a 52 weeks in a year
6 0
3 years ago
Read 2 more answers
What is adobe photoshop?
Hitman42 [59]
Its a photoshop that u need to pay for
4 0
3 years ago
Read 2 more answers
Where do you expect to participate in distance learning from?
DanielleElmas [232]

Answer:

hahaha very funny

Explanation:

pls rate this answer a 5/5 and heart it

3 0
3 years ago
Read 2 more answers
Other questions:
  • The this reference . a) can be used implicitly b) must be used implicitly c) must not be used implicitly d) must not be used 25)
    11·1 answer
  • Sometimes your Internet is slow and sluggish, what are some common problems that affect network functionality. Check all that ap
    14·1 answer
  • Attackers craft malicious probe packets and scan for services such as HTTP over SSL (HTTPS), SMTP over SSL (SMPTS) and IMAP over
    8·1 answer
  • .doc What is the difference between a skilled hacker and an unskilled hacker, other than skill levels? How does the protection a
    5·1 answer
  • What are the 6 external parts of a computer system
    5·1 answer
  • In which type of class methods is it typically necessary to filter bad arguments (either directly or indirectly with the help of
    13·1 answer
  • Only the one dose audio editors and video editors know this
    9·2 answers
  • 2.3 Code Practice: Question 1
    5·1 answer
  • Need answer ASAP!!!!
    14·1 answer
  • Write a statement that declares an anonymous enumerated type with the enumerators SMALL, MEDIUM, and LARGE.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!