1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zalisa [80]
3 years ago
15

What are the steps for inserting an internal link?

Computers and Technology
2 answers:
Zanzabum3 years ago
5 0

Answer:

=, worksheet, Ctrl+Enter

Explanation:

julia-pushkina [17]3 years ago
4 0

Answer:

=

Worksheet

Ctrl + Enter

Explanation:

You might be interested in
Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the a
Paraphin [41]

Answer:

Follows are the matching to this question:

Option \ a \to \ Option \ 3\\\\Option \ b \to \ Option \ 4\\\\Option \ c \to \ Option \ 1\\\\Option \ d \to \ Option \ 2\\

Explanation:

While time-consuming or prone to errors mechanical adjustments to both the referential, databases could be configured with four measures to engine violations. The restricted action causes the insert, update, and removes to only be denied. Set Null to NULL sets the invalid external key, whereas Set Default to a specific core consideration specified in SQL sets a default foreign key. Its Cascade operation spreads the main changes in external keys.

6 0
3 years ago
The practice of texting is most popular and what age group
Diano4ka-milaya [45]
Mostly teenagers and young adults (ages 14-21) text the most.
4 0
3 years ago
Read 2 more answers
Which role is delegated to personnel of the IT department and is responsible for maintaining the integrity and security of the d
enyata [817]

Correct question.

Which role is delegated to personnel of the IT department and how is responsible for maintaining the integrity and security of the data?

Answer:

<u>data custodian</u>

<u>Explanation:</u>

Remember, every organization generates data, and large organizations generate even larger data.

Hence, the role of a data custodian in an organization requires He implements measures to protect the organization's data, store and backup the data, as well as granting access to the data to authorized persons when needed.

3 0
3 years ago
How do you delete extensions on a chrome book bought on the chrome web store?
nirvana33 [79]
If you're using google chrome if you look in the top right corner there are a button with 3 horizontal lines, click it, once you do that go down that list and click settings once you click that, hit extensions on the left side of the screen, after that you will see a list of extension you have find the extension you would like to delete and look far right to the extension and click the trash can. Once you click the trash can a pop up will appear and will say "Confirm Removal"  and under that "Remove_______" If that is the extension you would like to remove continue if not go back to finding that extension If it is click remove
6 0
3 years ago
Read 2 more answers
What is used to switch to Outline View?
Yuri [45]
<span>What is used to switch to Outline View?

the Insert tab
the status bar
the Mailings tab
the Page Layout bar</span>

Actually, it is found in the VIEW TAB which is in the STATUS BAR. Coincidentally, all of those tabs can be found in the status bar.

7 0
3 years ago
Read 2 more answers
Other questions:
  • What is working with others to find a mutually agreeable outcome?
    6·1 answer
  • #Write a function called string_finder. string_finder should #take two parameters: a target string and a search string. #The fun
    14·1 answer
  • Tom wants a way to automatically create ads and simplify campaign management, using his resources and Google's machine learning
    12·1 answer
  • Who found the first computer bug in 1947, and invented the concept of a compiler in 1952
    6·1 answer
  • Write a application that can determine if a 5 digit number you input is a palindrome. If the number is a palindrome then print "
    14·1 answer
  • For questions 3-6, consider the following two-dimensional array:
    11·2 answers
  • Consider the following declaration:
    9·1 answer
  • Does anyone know 7.1.3: Firework karel?
    5·1 answer
  • Select the correct answer.
    15·1 answer
  • When methods have ____, other programs and methods may use the methods to get access to the private data.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!