1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maria [59]
3 years ago
7

How do you find a single number or name you want in a

Computers and Technology
1 answer:
Tamiku [17]3 years ago
8 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

You can find a single number or name in a large worksheet containing thousands of numbers and names using the find and replacement feature in excel.

You can use Ctrl+F keyboard shortcut for finding and replacing features. When you press Ctrl+F, a dialog will get open, using this dialog, you can find the required number or name while entering in the search text box. Then, click on the Find button, if the worksheet matches the result, give you the matched result in the yellow highlighted color.

Also, you can use Ctrl+F to replace a name or number with some other name or number.

Alternatively, you can do this using the home tab, then find the option find and select under the editing group of commands.

You might be interested in
HELP PLEASE!!!! Which development method is best explained in this way: developing a system through repeated cycles and smaller
vlada-n [284]

Answer:

Incremental method.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

An incremental model refers to the process in which the requirements or criteria of the software development is divided into many standalone modules until the program is completed.

Hence, an incremental method typically involves developing a system through repeated cycles and smaller portions at a time, enhancing and evolving the system over time.

In SDLC, a waterfall model can be defined as a process which involves sequentially breaking the software development into linear phases. Thus, the development phase takes a downward flow like a waterfall and as such each phase must be completed before starting another without any overlap in the process.

Also, a spiral model can be defined as an evolutionary SDLC that is risk-driven in nature and typically comprises of both an iterative and a waterfall model. Spiral model of SDLC consist of these phases; planning, risk analysis, engineering and evaluation.

8 0
2 years ago
What is the best java 3d modeler library?
LenaWriter [7]
I believe its "Thinking Universe"
5 0
3 years ago
Show the printout of the following code.
alexira [117]

Answer:

E. 7.0

Explanation:

the 7 of the out of the older and make a shame of waves and force of trying

7 0
3 years ago
Your customer asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his works
Helen [10]

Answer:

Yes

Explanation:

Depending on the ethernet standard used, the IEEE 802.3 is faster than the WIFI (IEEE 802.11ac).

The ethernet protocol on cabled networks are of different speed based on ethernet standard which ranges from 10 Mega-bits to 100 Giga-bits per second. This protocol is found in the physical layer of the OSI model.

The wifi 802.11ac also known as wifi 5 is a wireless connection medium in the physical layer of the OSI model. It has a range of aggregate speed capacity of  433 mega-bits per second to 6.77 giga-bits per second.

5 0
3 years ago
Betty set up an account on a popular social networking website. She wants to know whether the privacy policy is effective for he
Ahat [919]

the info needed to log in

-This would show what is protected in the privacy policy and its related to you since it would show personal data.

-A good Privacy Policy depends on understanding these matters - showing that this is not an agreement to take for granted.

7 0
3 years ago
Other questions:
  • It is important for security practitioners to take into consideration the __________ element when devising password security pol
    15·1 answer
  • What is the gauge manifold made of
    14·1 answer
  • A standard for compressing music into computer files that can be easily exchanged on the Internet is called a(n) ______. A. musi
    5·1 answer
  • : Show that the propositions (p ∨ q) ∧ (¬p ∨ r) and (p ∧ r) ⊕ (¬p ∧ q) are logically equivalent.
    6·1 answer
  • The 8-bit ____ field is used by source network hosts and forwarding routers to distinguished classes or priorities in ipv6 packe
    11·1 answer
  • What are the steps to creating a blank database? Use the drop-down menus to complete them.
    9·1 answer
  • A user input is when the user interacts with the program by typing.<br> True<br> False
    11·2 answers
  • The memory used by the CPU to temporarily hold data while processing is called what?
    11·1 answer
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • Alexis plans to stop trading once she lose 5% of her account balance, her account balance is $215.00. How much money is she will
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!