1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
7

What tasks do data entry macros commonly perform? Check all that apply.

Computers and Technology
1 answer:
Paha777 [63]3 years ago
3 0

Answer:

test whether a user entered a value

You might be interested in
An output device is any device that displays, prints, or plays content stored on a computer. from the list below, identify the d
inysia [295]
Answer is C = Speaker

How? as the speaker is the only item on the list that displays any type of content, that being audio, it's the only feasible answer to this question.
3 0
3 years ago
Which of the following option is not available in Insert>>Picture?
zysi [14]

Answer:

Word art

Explanation:

its copy and paste

7 0
3 years ago
Read 2 more answers
Why is it important to increase componentization and standardization?
liraira [26]
Jiskha help me with something similar with
8 0
3 years ago
A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also
bekas [8.4K]

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

7 0
3 years ago
how can people access to a range of online services affect their ability to operate safely in the digital world
Andru [333]
Have parental controls on certain sites
3 0
3 years ago
Other questions:
  • Design a 4-bit register that can accept an input from the user and store the accepted input. The 4-bit register will operate in
    6·1 answer
  • How to use javascript libraries in javascript code?
    9·1 answer
  • How do I center images in HTML. Also I need to have one image lay over another. How do I do this in HTML?
    11·1 answer
  • Which of the following events would most likely produce an earthquake
    10·1 answer
  • Cuales son las caracteristicas de los celulares
    9·1 answer
  • A tornado destroyed many
    6·2 answers
  • The __________ operator increases the value of the variable by 1 after the original value is used in the expression in which the
    7·1 answer
  • How can injection attacks be prevented? Check all that apply
    6·2 answers
  • Recommend how could you integrate positive aspects of digital literacy into your own
    13·1 answer
  • 6. kinukuha nito ang kabuuang bilang ng mga numerical na datos sa mga piniling cells
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!