1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
12

Which function category is not in Excel 2016?

Computers and Technology
2 answers:
AleksandrR [38]3 years ago
3 0

Answer:

Text is not excel category.

Fiesta28 [93]3 years ago
3 0
B. Text,
I had this same question on a quiz
You might be interested in
At what depth does an employer need to use a protection system to ensure the safety of workers in a trench or excavation?
nevsk [136]
Trench 4 foot or deeper and must be located 25 foot within eachother
3 0
3 years ago
Read 2 more answers
Which game title went on to become the highest selling unbundled cartridge game?
alexandr402 [8]

Answer:

Tetris

Explanation:

On June 6, 1984, the first version of Tetris was unveiled and quickly took the world by storm. While Tetris has appeared on every major gaming platform from the Commodore 64 to the iPhone, it arguably gained its greatest notoriety as the cartridge game bundled with the original Nintendo Game Boy.

5 0
2 years ago
What is it called when there are an equal number of characters on either side of the horizontal center of the page?
Naddika [18.5K]

Answer: the term is known as Align Justified

Explanation:

In typesetting and page layout, alignment or range is the setting of text flow or image placement relative to a page, column, table cell, or tab. The type alignment setting is sometimes referred to as text alignment, text justification, or type justification.

5 0
2 years ago
Is It Safe to Use LinkedIn Automation?
Stolb23 [73]

Answer:

A lot of people have claimed that they lost their full-established accounts after using LinkedIn automation tools. LinkedIn detected the activity and blocked their accounts.  

But it’s not the tool that causes spam, it’s the approach you adopt while using these tools.  

Many people think that LinkedIn automation tools(LinkedCamp) can generate leads magically over the night. They send thousands of connection requests and messages using automation and as a result, LinkedIn detects their activity.  This is not how it works. You need a proper strategy to leverage the potential of these tools. Even the best LinkedIn automation tools cannot guarantee success if you try to overdo the activities.

6 0
3 years ago
Read 2 more answers
It is used between two or more computers. One computer sends data to or receives data from another computer directly.
dmitriy555 [2]

Answer:

File transfer protocol (FTP)

Explanation:

An information can be defined as an organized data which typically sent from a sender to a receiver. When a data is decoded or processed by its recipient it is known as information.

Generally, there are several channels or medium through which an information can be transmitted from the sender to a receiver and vice-versa. One of the widely used media is the internet, a global system of interconnected computer networks.

There's a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport later, into small chunks called packets rather than as a whole.

The three (3) main types of TCP/IP protocol are;

I. HTTP.

II. HTTPS.

III. FTP.

File transfer protocol (FTP) is used between two or more computers. One computer sends data to or receives data from another computer directly through the use of network port 20 and 21.

4 0
2 years ago
Other questions:
  • The exercise instructions here are LONG -- please read them all carefully. If you see an internal scrollbar to the right of thes
    8·1 answer
  • Which of the following journals is not aimed at the public as well as scientists?
    7·1 answer
  • Microsoft has developed the Active Directory Domain structure so that a central authority, called the __________, is the reposit
    7·1 answer
  • WILL DO A BRIANLY! Use an algorithm to help the Python Turtle get to the finish line in 10 steps by using only the 3 commands be
    12·1 answer
  • What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively? answer
    13·1 answer
  • Which camera mode gives the photographer the greatest amount of control?
    7·2 answers
  • Adrian wants to run a digital movie clip that his friend shared with him through email. His system has 2 GB of RAM and 20 GB of
    15·1 answer
  • Amazon Web Services and Microsoft Azure are some of the most widely used _______.
    7·1 answer
  • If a computer uses 500 characters, how many bits this system requires to give different code to all characters?
    15·1 answer
  • Frequently used _____________ can be saved as _____________ for use in analysis, dashboards, reports, tickets, and alerts.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!