1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
13

In the Allow list box in the Data Validation dialog box,the _____ option means that the cell will accept only times.A) Chronolog

yB) ClockC) TimeD) Calendar
Computers and Technology
1 answer:
Maurinko [17]3 years ago
8 0

Answer:

C) Time

Explanation:

Given that Data validation is a feature in Microsoft Excel in which a user used to specify or determines the type of value or characters that can be typed or entered into a cell.

For example, using data validation to ensure a value of a number is whole numbers, or to ensure character entry is less than 25 characters.

Hence, in this case, the correct answer is the TIME option, will only result in cell accepting only times.

You might be interested in
Many who enter the field of information security are technical professionals such as __________ who find themselves working on i
Fynjy0 [20]

Answer:

networking experts or systems administrators ,database administrators,programmers.

Explanation:

The people who enter in the field of information security are professionals in technical fields bu their work is totally into the field of security like working on security applications.They don't work on the traditional IT assignments such as developing software,apps,website etc.

3 0
3 years ago
The world wide web was originally conceived of as a(n) _____.
Setler [38]
Hello <span>Lcedillo7073 </span>


Answer: The world wide web was originally conceived of as a(n) Internal document management system


Hope this helps
-Chris
7 0
3 years ago
Your task is to create a bash shell script that is able to backup all the C++ program files in your current directory. The algor
Oliga [24]

Answer:

backup() {

 read dirname;

 if [[ whereis . /`$dirname` 2>  sterr.exe]]  

    then

        mkdir  $dirname

 for f in . / *.cpp

 do

    cp f "path_to_dirname"

    echo "file backup complete"

}

backup( )

Explanation:

The bash script above is used to backup C++ source files in a directory to a backup directory which is created if it does not exist, and copy's each .cpp file to backup, then sends a message to declare its completion.

7 0
3 years ago
How many words fit on a double-spaced page?
sveticcg [70]
It depends on the length of the words.
5 0
3 years ago
Which of the following uses replication to Infect multiple computers?
Nikolay [14]

Answer:

Trojan horse

Explanation:

mostly all the above mentioned use replication to infect computers but the one that uses replication to invest multiple computers at a time is Trojan horse.

hope it helps .

3 0
3 years ago
Read 2 more answers
Other questions:
  • To display the control panel window, first right-click ____ and then click control panel.
    5·1 answer
  • Which is a characteristic of an effective problem statement? It is based on research. It contains outside information. It contai
    12·1 answer
  • Write a shell script called SpellOutDate that prints the detail of the current date in separate lines. For example if the curren
    13·1 answer
  • You should structure the<br> first before you search for a relevant picture.
    11·1 answer
  • The blue bar across the top of the screen informs you of the Screen Title, or what step you are on.
    5·1 answer
  • Differentiated instruction is designed to educate children through ________ techniques in order to ensure every student is being
    13·1 answer
  • You have been supporting CSM Tech Publishing's Windows Server 2016 server network for over a year. The office has two Windows Se
    12·1 answer
  • It is a data being transported on a network​
    13·1 answer
  • SOMEONE PLEASE HELP ME WITH THIS ILL GIVE YOU BRAINLY IF YOU GET IT RIGHT PLEASE!!!!!
    13·2 answers
  • swer from the options 1. How many basic input devices does a desktop computer have? a)2 b)3 c)1 d)4 2. The computer equipment wh
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!