1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vfiekz [6]
3 years ago
10

Help a brotha out..................

Computers and Technology
1 answer:
Sveta_85 [38]3 years ago
3 0

Answer:

highlight a cell in column A; place your cursor on the border of the cell so it turns into a two sided arrow and drag

Explanation:

y

You might be interested in
What are the example of dedicated computers?
Drupady [299]
A dedicated server is a single computer in a network reserved for serving the needs of the network. For example, some networks require that one computer be set aside to manage communications between all the other computers. A dedicated server could also be a computer that manages printer resources.
8 0
3 years ago
The ____ cell on the worksheet is the one into which you can enter data.â
Illusion [34]

I guess the best answer is Active.

The Active cell on the worksheet is the one into which you can enter data.

3 0
3 years ago
Read 2 more answers
With a word processor, you can create all of the following EXCEPT __________.
Nata [24]
You cannot create a database wurg a word processor
8 0
3 years ago
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
tatiyna

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

5 0
3 years ago
If Moses receive an email from his friend what is the name of the space where the massage is kept​
kipiarov [429]
Bbb NC d to lc fix B this is not keyboard
3 0
3 years ago
Other questions:
  • Why is Copyright important?
    5·1 answer
  • Explain why computer users should use the cloud?
    14·1 answer
  • Which of the following are not deducted on a typical pay stub
    12·1 answer
  • The Internet raises the bargaining power of customers most effectively by: making information available to everyone. reducing ba
    15·1 answer
  • Which concept often comes in conflict with privacy rights?
    14·1 answer
  • 2<br><br> What combination of keys turns the value in a cell into a percentage?
    12·1 answer
  • Decision making at the executive or strategic level requires business intelligence and knowledge to support the uncertainty and
    12·1 answer
  • Modify the statistics program from this chapter so that client programshave more flexibility in computing the mean and/ or stand
    8·1 answer
  • What is information communication technology?
    7·2 answers
  • Answer pls pls pls pls ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!