1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
3 years ago
12

Which are the two alternatives for pasting copied data in a target cell or a group of cells?

Computers and Technology
1 answer:
Arada [10]3 years ago
8 0

Answer:

first blank: paste

2nd blank: ctrl + v

Explanation:

those ways are just how you do it anywhere.

You might be interested in
You know a Linux command will perform a desired function for you, but you cannot remember the full name of the command. You do r
Blababa [14]

Answer:

The correct answer is option  a. man –k flush.

Explanation:

When you want to flush a variable from your system you should use the command flush in linux.

The command you'll be typing in the command prompt of the linux is man -k flush.

Hence the answer to this question is option a. man -k flush.

6 0
3 years ago
Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s
VikaD [51]

Answer:

<em>Empirical technical </em>research has a fundamental objective, which is to provide objective and independent information on the quality of the product to the interested party or stakeholder. It is one more activity in the quality control process.

Explanation:

Testing is basically a set of activities within software development. Depending on the type of tests, these activities may be implemented at any time during said development process. There are different software development models, as well as test models. Each one has a different level of involvement in development activities.

In a full penetration testing process, there are pre-instances to run this tool, but to take the first steps it is probably the best way to start. Nmap is a network scanning tool that allows you to identify what services are running on a remote device, as well as the identification of active computers, operating systems on the remote computer, existence of filters or firewalls, among others.

In simple words, when a server or device is going to be attacked, the attacker can carry out different attacks depending on the service: it is not the same to damage a web server, a database server or a perimeter router. Therefore, in any deployment, the first step will be to identify the services in the infrastructure, to decide how to proceed and, considering that in a penetration test the steps of an attacker are “imitated”, it will also be started in the same way.

5 0
4 years ago
Celeste is writing a paper. However, two pages in, her computer shuts down unexpectedly. She never saved her paper, and all her
alekssr [168]
<span>Random access memory (RAM)</span>
8 0
4 years ago
Read 2 more answers
Which of these lists correctly sort block numbers from lowest to highest?
Olin [163]

Answer:

d

Explanation:

d

8 0
3 years ago
Write a program reverse-order.cpp which asks the user to input two dates (earlier date then later date). The program should repo
xxMikexx [17]

Answer:

reverse-order.cpp

#include<iostream>

#include <fstream>

#include <cstdlib>

#include <climits>

#include <sstream>

using namespace std;

#include <vector>

int main()

{

  ifstream fin("Current_Reservoir_Levels.tsv");

  if (fin.fail())

  {//check whether file exists or not

      cerr << "File cannot be opened for reading." << endl;

      exit(1);

  }

  //declare two vectors

  vector<string> Date;

  vector<float> westElVec;

  string header;

  getline(fin, header); // read one line from the file

  string dateArr[365], date;

  double eastSt, eastEl, westSt, westEl;

  string date1, date2;

  cout << "Enter starting date: ";

  cin >> date1; // getting starting date from user

 

  cout << "Enter ending date: ";

  cin >> date2; // getting ending date from user

  int count = 0;

  while (fin >> date >> eastSt >> eastEl >> westSt >> westEl)

  {

      fin.ignore(INT_MAX, '\n'); //skips to the end of line,

      //get the record from file

      //check if data is between the start and end or not

      if (date1 <= date && date2 >= date)

      {//insert the data

          Date.push_back(date);

          westElVec.push_back( westEl);

          count++;

      }

  }

 

  //sort the data by date indecending order

  for (int i = 0; i < count; ++i)

  {

      for (int j = 0; j < count - i - 1; ++j)

      {

          // Comparing consecutive dates

          if (Date[j] < Date[j + 1])

          {

              ////swap West basin elevation

              //double twestElVec = westElVec[j];

              //westElVec[j] = westElVec[j + 1];

              //westElVec[j + 1] = twestElVec;

              //swap dates

              string tDate = Date[j];

              Date[j] = Date[j + 1];

              Date[j + 1] = tDate;              

          }

      }

  }  

  for (int i = 0; i < count; i++)

      cout << Date[i] << "\t" << westElVec[i] <<"ft"<< endl;

  fin.close();

  //system("pause");

return 0;

}

Explanation:

7 0
3 years ago
Other questions:
  • In computer science what major jobs is appropriate for someone who majors in information systems
    10·1 answer
  • The ticketing system at the airport is broken, and passengers have lined up to board the plane in the incorrect order. This line
    8·1 answer
  • User Jsmith is a member of the Accounting and Contractor groups, and is trying to save a file to Folder A on his local computer,
    13·1 answer
  • Holly has at most $828 to spend for moving from her old apartment. The moving company charges $80 per hour plus at rate of $300.
    9·1 answer
  • 5. When resizing an object with the Select Tool, what keyboard key should you press to make it resize equally in all directions?
    11·1 answer
  • What method of research deals with large amounts of information that is analyzed and presented statistically?
    9·1 answer
  • This is the term popularly used to describe fixing errors in a computer program.
    9·2 answers
  • A spreadsheet is an example of a(n):
    10·1 answer
  • If a printer can print 10 characters per second how many minutes (rounded) would it take to print a page with 66 lines of 80 cha
    6·1 answer
  • Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!