1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
13

Sonora wants to extend the cells to be added in her formula. What is the quickest way to add more cells?

Computers and Technology
2 answers:
n200080 [17]3 years ago
8 0

Answer:

Left-click on a cell that is included and drag the cursor.

Explanation:

djyliett [7]3 years ago
7 0

Answer:

D

Explanation: took the test on edge

You might be interested in
What's the risk or effect of software piracy?
slamgirl [31]
You can go to jail get in alot of trouble plus you always have a chance of letting a virus into yoru computer
7 0
3 years ago
Read 2 more answers
Memory containing hardwired instructions that the computer uses when it boots up, before the system loads. In PCs the instructio
VladimirAG [237]

Answer:

<h2>Rom</h2>

Explanation:

ROM is memory containing hardwired instructions that the computer uses when it boots up, before the system software loads

4 0
3 years ago
Read 2 more answers
Javascript or java? which one is better?
kifflom [539]
See, one is more or less a toy, designed for writing small pieces of code and traditionally used and abused by inexperienced programmers. 

The other is a scripting language for web browsers. Sorry about my limited knowledge.
3 0
3 years ago
Read 2 more answers
The rules of a programming language constitute its__________________
kogti [31]
The rules of a programming language constitute its syntax.
7 0
2 years ago
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
BlackZzzverrR [31]

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

4 0
3 years ago
Other questions:
  • Which of the following decimal (base-10) values is equivalent to the binary (base-2) value 101001?
    15·1 answer
  • The fast food restaurant Chipotle pulled its app from Apple's app store when customer demand caused the firm's servers to crash.
    14·1 answer
  • Suppose two hosts, A and B, are separated by 15,000 kilometers and are connected by a direct link of R = 5 Mbps. Suppose the pro
    11·1 answer
  • Consider the following statements: #include #include class Temporary { private: string description; double first; double second;
    9·1 answer
  • What options of the hierarchical star topology within the ANSI/TIA-568-C allow the ability to move the workgroup switches closer
    7·1 answer
  • HELP! ASAP I KNOW IT'S QUITE A HANDFUL BUT I NEED THIS ANSWER!!
    10·1 answer
  • If a triathlon is a sport combining three events, what do you think would be the word for a sport combining five events?
    7·1 answer
  • Use the drop-down menus to complete the statements about message marking, categorizing, and flagging.
    13·2 answers
  • Charlie makes pizza at a restaurant. The customers always compliment how great the pizza tastes. But Charlie takes a long time t
    7·2 answers
  • YASHARI earns $27,000 per year, is single, and lives in Wyoming. She has $7000 in Direct Subsidized loans and another $19,000 in
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!