1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skad [1K]
3 years ago
15

What are styles? built-in conditional formatting rules formatting applied with the Format Painter defined combinations of format

ting cells that were created using the AutoFill feature
Computers and Technology
2 answers:
Contact [7]3 years ago
8 0

<em>ANSWER</em>

<em>DEFINED COMBINATIONS OF FORMATTING</em>

Shkiper50 [21]3 years ago
5 0

Answer:

c

Explanation:

You might be interested in
Which example task should a developer use a trigger rather than a workflow rule for?
Komok [63]

Answer:

A. To set the primary contact on an account record when it is saved

Explanation:

After updating a Contact and then you set the Primary checkbox, the contact becomes the primary contact and this then updates the reference in the Parent Account. Triggers are used for this purpose and not workflow rule. In this case there is only one contact at a time that is set as Primary Contacts, and in the case where an Account does not have any Contacts, the first contact that is created is made the primary and the trigger sets that value in reference.

6 0
3 years ago
Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access
mojhsa [17]

Answer:

The answer is "Confidentiality"

Explanation:

Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach  can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.

Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.

Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.

6 0
2 years ago
To remove the field list when working on a report in Design view, tap or click the ____ button on the REPORT DESIGN TOOLS DESIGN
Rudiy27

Answer:

The correct answer to the following question will be "Remove".

Explanation:

A report consists of information taken from tables or queries and information stored in the design of the report such as names, heading, and graphics. Also known as the source of the report are tables or queries that provide the underlying data.

The majority of reporting tools provide only a standard report layout where the report developer may not construct a custom layout with elements positioned in certain areas.

And, If we want to remove any field while working in Design view on a report then we have to click on the remove button for such tasks,

Therefore, the Remove button is the correct answer.

6 0
3 years ago
Computers influenced the outcome of world war 2 by?
Elan Coil [88]

Answer:

Computers were introduced to the U.S. Navy on the eve of war for submarines. The computers used trigonometry to help the submariners know when to fire their torpedoes at a moving target. These devices were expanded to surface ships to provide more accurate firing of the guns.

Explanation:

3 0
2 years ago
Which of the following acts as the central authority in the network?
kiruha [24]

Answer:

Server

Explanation:

i know it will be server

4 0
3 years ago
Other questions:
  • _____ refer(s) to computer programs that provide instructions for a computer to execute a desired task. Answer .a.Software .b. I
    7·1 answer
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • A study guide can be created
    6·2 answers
  • ______ devices are high-performance storage servers that are individually connected to a network to provide storage for the comp
    5·1 answer
  • A slow response when opening applications or browsing the Internet, applications that do not work properly, an operating system
    5·2 answers
  • At the beginning of Section 5.2, it is stated that multiprogramming and multiprocessing present the same problems, with respect
    8·1 answer
  • A ________ is a question you ask about data stored in a database
    9·1 answer
  • Does anyone know 7.1.3: Firework karel?
    5·1 answer
  • When using for loops and two-dimensional arrays, the outside loop moves across the ___________ and the inside loop moves across
    7·1 answer
  • What type of hard disk is recommended for a Windows 10 VM?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!