1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fgiga [73]
3 years ago
14

Tom teaches in a high school. He wishes to sort a spreadsheet containing students' marks in various subjects by descending order

of total
marks. While sorting the spreadsheet, what do you do before clicking the Sort option from the menu?
OA
filter the data to sort
OB.
arrange the data alphabetically
O c. select the data to sort
OD.
look up the data to sort
Computers and Technology
1 answer:
cricket20 [7]3 years ago
4 0

Answer:

Select the data to sort

Explanation:

You might be interested in
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
I need some questions and answers in spreadsheet​
yarga [219]

Answer:

you need to show what you need help with

Explanation:

5 0
3 years ago
If you attempt an edgeunity quiz is your latest attempt the one counted?
tekilochka [14]

Answer:

Hello

Explanation:

Hello profile picture of a nub how are you doing today?

8 0
3 years ago
These are code parts which can be collapsed or extended
skelet666 [1.2K]

Answer:

?????????? are there any options

3 0
3 years ago
A knowledge and skills test is a tool support managers use when selecting new employees; it measures an applicant's understandin
OLEGan [10]

Answer:

Option (a)

Explanation:

It is true that managers takes some interviews and some tests which include questions which are able to identify the capabilities of the employee. Their field of expertise can be known by these tests which helps in which project they should put under where their skills will bloom and they can be more efficient. It helps manager to know if the employee is the best fit for their company or not.

6 0
3 years ago
Other questions:
  • What Software is used to play,create, and modify audio and video files
    7·2 answers
  • The best time to visit a college is: A. during spring break. B. on a weekend. C. when the college is in session. D. during winte
    8·2 answers
  • The command button to protect a document is part of the​.
    10·1 answer
  • Why are typewriter keys arranged the way they are?
    14·1 answer
  • Why won't Brainly let me send a link? This is just du*mb! I want to send good articles explaining a content, and this site just
    5·1 answer
  • I need help ASAP please and thank you!
    14·1 answer
  • 3.5 Code Practice: Question 1<br> (Website: Edhesive)
    14·1 answer
  • Write C++
    6·1 answer
  • Frankie used the ps command to find the process id of an application that he needs to stop. What command-line tool should he use
    12·1 answer
  • Suppose a program is operating with execution-time binding and the physical address generated is 300. the relocation register is
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!