1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harrizon [31]
3 years ago
15

What are examples of Table Tools options that can help edit data?

Computers and Technology
2 answers:
nikitadnepr [17]3 years ago
8 0

Answer:

1 - change views

2 - change fonts

3 - add controls

4 - insert rows and columns

5 - add existing fields

6 - change margins

7 - view the property sheet

8 - change padding

Sedaia [141]3 years ago
5 0

Answer:

properties

add and delete

before change

Explanation:

You might be interested in
The component that allows you to make a paper-based copy of a body of text is the _____.
ANTONII [103]
The correct answer is: Scanner

The scanner is a piece of technology which unlike the printer is an input device which basically scans the top-view of any flat surface (usually paper but is definitely not limited to it) introduced in its effective range using light. The data scanned is then transfered to the Central Processing Unit for futher processing. The processed image can then be outputted and seen on the monitor's display. Once available for printing, the Central Processing Unit will just send the processed image into the printer ad voila, your scanned image is now printed in a piece of paper!

Today, scanners come with printers as a bundle. It is a perfect combination since the printer will just print the image anyway.
5 0
3 years ago
Assessment timer and count Assessment items Item 6 How many different keys can be used in a single sort? 1 2 3 4
Alik [6]

Answer:

Its C 3. hope this helps

Explanation:

6 0
3 years ago
What will you see on the next line? >>> int(6.5)
tankabanditka [31]

Answer:

6

Explanation:

The int functions founds down to the nearest whole number, which in this case would be 6.

8 0
3 years ago
Read 2 more answers
Explain the concept of risk management, including risk identification, assessment, and control.
abruzzese [7]

Answer:

Risk management is the technique that is used for managing the risky situation so that security of the system or organization can be maintained. The risk can be reduced by parameters like monitoring the system,alertness, preventive measures etc. There are terms related with the risk management for prevention of the risk such as risk control ,risk identification and risk assessment .

  • Risk control is the method that is used for calculating the loss or damage experience and then taking the correct measures to reduce the loss and thus, controlling the risk.
  • Risk assessment is the analyzation of the threats and source of damage/loss that is caused or can be caused by assessing the whole process and functioning.
  • Risk identification is the technique through which the threat is listed over a document and sorted in accordance with the category of risk, risk response etc.  

7 0
3 years ago
A spreadsheet is an interactive computer program used for
aksik [14]
Making charts, files that need complicated calculations
5 0
3 years ago
Other questions:
  • The sequence of folders to a file or folder is known as its _______.
    6·1 answer
  • What is AI and its necessary types?
    6·1 answer
  • HELP PLEASE NOW ASAP BRAINLIEST
    13·2 answers
  • The isometric projection camera technique provides an illusion of perspective by using things like parallax scrolling to create
    10·1 answer
  • _____ are likely to support bigger government, social welfare programs, and legalized abortion.
    8·2 answers
  • When network cards are communicating, bits can occasionally be corrupted in transmission?
    5·1 answer
  • What framework provides a simple API for performing web tasks?
    13·1 answer
  • Write down a pair of integers whose sum is​ 0
    5·1 answer
  • Monero is cryptocurrency that focuses on transparency of ownership. True or false
    12·1 answer
  • A type of attack where the adversary intercepts network packets, modifies them, and inserts them back into the network is called
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!