1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
torisob [31]
3 years ago
9

Which key combination should you use

Computers and Technology
2 answers:
____ [38]3 years ago
7 0

Answer: Ctrl + Alt + delete

Explanation:

Ghella [55]3 years ago
7 0

Answer:

Control + Alter + Delete

You might be interested in
Question 19
MaRussiya [10]

Answer

D

Explanation:

5 0
3 years ago
Read 2 more answers
I have been trying to work on this for a while now, and this is on excel
cluponka [151]

Answer:

=IF(INDEX(INDIRECT(C10), B10)=0,"",INDEX(INDIRECT(C10), B10))

Or

=IF((INDEX((INDIRECT(Dept,TRUE)),Reason))="","",(INDEX((INDIRECT(Dept,TRUE)),Reason)))

Explanation:

Given

Your formula:.

=INDEX(INDIRECT("Dept"),Reason)

Dept column = C (C10)

Reason field = B (B10)

The issue with your formula is that you failed to include a statement to test the falsity of the first condition; in other words, if your if statement is not true, what else should the formula do.

The question says that

"Nest the function inside an IF function so that issues currently displaying as a 0 will display as a blank cell" this means that

if the INDEX() function returns 0, a blank should be displayed in H10 blank, instead.

So, the right formula both of these two. You can use any of them

1. =IF(INDEX(INDIRECT(C10), B10)=0,"",INDEX(INDIRECT(C10), B10))

2. =IF((INDEX((INDIRECT(Dept,TRUE)),Reason))="","",(INDEX((INDIRECT(Dept,TRUE)),Reason)))

The two does the same function; the only difference is that

(1) considers the cell itself while (2) considers the contents of the cell.

The analysis of both is that

They both use a nested indirect reference to check for the content of cells displaying 0.

The first if checks for the above mentioned; if yes, cell H10 is made to display a blank else it's original content is displayed.

8 0
3 years ago
When using color in a computer - generated presentation aids you should use?
Temka [501]
<span>the answer is: the same background color on all visuals and no more than two colors for words.</span>
6 0
3 years ago
Write any two use of computer in school​
igomit [66]

Answer:

To solve mathmatical problem

To make questions paper

7 0
3 years ago
Which of the following hacker attacks against wireless networks are virtually undetectable?
Ede4ka [16]

Answer: A. passive attacks

Explanation:

Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.

A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.

Methods of carrying out passive attacks.

•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.

•Dumpster driving: Attackers or intruders search for information from discarded computers and

other gadgets, those information can help to attack a network.

7 0
3 years ago
Other questions:
  • When a crystal grows in unrestricted space, how does growth occur?
    14·2 answers
  • What are some useful properties of current electricity
    13·2 answers
  • A troubleshooter's ability to design and test hypotheses in order to solve a technology problem is based on ____.
    14·1 answer
  • If you want to change the smart quote settings, what steps should you follow to find them?
    5·1 answer
  • Name all mario kart games in order
    15·2 answers
  • Please select the word from the list that best fits the definition Asking for review material for a test
    14·2 answers
  • Leon needs to configure the days and times of his work week for his Outlook Calendar. Which option should he
    12·2 answers
  • EXPLAIN WHY CRYPTOCURRENCIES ARE NOT RELIABLE.
    5·1 answer
  • What are the components of computer system??<br>​
    10·2 answers
  • Consider the following variable declarations and initializations.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!