1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alex41 [277]
3 years ago
9

What are 3 tools you would use to make the spreadsheet look nicer? Explain what

Computers and Technology
1 answer:
Lady bird [3.3K]3 years ago
4 0

Answer:

Add-Ons, Add-Ins and use Excel

Explanation:

You might be interested in
. When would one use the analytic application fraud detection?
vaieri [72.5K]

Answer:Fraud detection through analytical method is used for detection of the fraud transactions,bribe activity etc in companies, business,etc. This techniques helps in the reduction of financial frauds in the organization, have the control over company to protect it,decrease in the fraud associated costs etc.

It has the capability of identifying the fraud which has happened or going to happen through the analytical ways and human interference. The organizations or companies require efficient processing and detection system for identification of such false happening.

4 0
3 years ago
Find the mean median mode and range of the data set <br> 11, 13,11,12 10 ,12,11,8
denpristay [2]

Answer:

Mean: 11

Mode: 11

Median: 11

Explanation:

7 0
3 years ago
In a linked chain implementation of a queue, the performance of the enqueue operation
alexdok [17]

Answer:

A.O(1)

Explanation:

In the implementation of queue by using linked chain the performance of  the enqueue operation is O(1).We have to  maintain  two pointers one  head and the other tailand  for  enqueue operation  we have to insert element  to the next of the tail and then  make that element  tail.Which takes O(1) time.

4 0
3 years ago
a client has requested adjustments to the arrangement and placement of elements on an image. what does the client want changed?
qaws [65]

Considering the situation described above, the client wants the <u>image's recipe to be changed.</u>

<h3>What is the Image Recipe?</h3>

Image Recipes are characteristics of an image or picture. It includes features like shape, size, form, pattern, line, shadow, tone, color, contrast, positive space and negative space, etc.

Given that the client needs adjustments to the arrangement and placement of elements on an image, this is a request for a change in the image recipe.

Hence, in this case, it is concluded that the correct answer is "<u>the client wants the recipe of the image changed."</u>

Learn more about the Image Recipe here: brainly.com/question/1605430

6 0
2 years ago
When a single controller device communicates with multiple peripheral devices, what wires are simultaneously connected to all de
Tems11 [23]

The wires that are simultaneously connected to all devices in the network are;

SDA(Serial data line) and SCL

Integrated Circuits Communication

This involves I²C which is a form of communication based on integrated circuits.

Now, this I²C is a serial communication interface that has a bidirectional two-wire synchronous serial bus which usually comprises of two wires namely SDA (Serial data line) and SCL (Serial clock line).

Read more about integrated circuits communication at; brainly.com/question/26153031

7 0
2 years ago
Other questions:
  • In this type of network, data is certain to reach its destination.
    7·1 answer
  • What software is typically used for larger systems?
    11·1 answer
  • Given that the array monthSales of integers has already been declared and that its elements contain sales data for the 12 months
    6·1 answer
  • Timothy is a multimedia designer. He needs to create a prototype of a new product that his firm is launching. Which multimedia s
    11·1 answer
  • Chemical reaction rates are proportional to a rate constant, k, which changes with temperature according to the Arrhenius equati
    14·1 answer
  • How designers have created products from waste materials?
    7·1 answer
  • The operating system is not responsible for allowing one computer to share information with other computers.
    15·2 answers
  • A user tells a help desk technician that their browser is displaying a message that a site can't be
    14·1 answer
  • 9.4 Code Practice: Your task is to determine whether each item in the array above is divisible
    14·1 answer
  • The internet in this Packet Tracer network is overly simplified and does not represent the structure and form of the real intern
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!