1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vovikov84 [41]
3 years ago
6

Louis has entered a column of expense values. What feature can he use to insert the total expenses at the end of the column?

Computers and Technology
1 answer:
vovangra [49]3 years ago
5 0
I think it’s B tho I’m not really sure
You might be interested in
A broker statement is an example of an ___ record
VARVARA [1.3K]

Answer: investment

Explanation:

3 0
3 years ago
Read 2 more answers
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
What is a non-example of job outlook.
Papessa [141]

Answer:

Before you choose a career you should find out what its job outlook is. ... employed in a particular occupation over a set period, for example, two years, five years or ... 2% and 4%); Have little or no change (a decrease or increase of 1% or less) .

Explanation:

4 0
2 years ago
Alright, so I have a wireless mouse that uses a dongle (it's not Bluetooth nor wired). But recently I realized that none of the
serg [7]

Answer:Mouse is not working because you haven't changed your battery for months.

Remember that, most of wireless mouses use AA 1.5V battery for it's power on. If you've let your computer and mouse set on, then the battery can only run around 5-6 months. If you turn off your mouse everytime you're not using then the battery life might get longer. So, all you have to do is buy new batteries and replace it. Follow steps of replacing battery in this video.

(Consider buying dry battery for using longer)

No.2: Loose battery in the tray

This is quite common as well. We understand that the mouse made materials can have its own changing. Sometimes, you might drop your mouse, then after that, the loosen battery just happening around. A loosen battery might get your wireless mouse not working well. It works then stop at the middle. Follow the easy steps to fix this state of mouse is not working.

No. 3: Bad Pairing.

Due to some reasons, bad pairing can happen and get your mouse stuck on laptop screen. Bad pairing might be from overworking or overloading tasks on your PC. Easy quick fix for bad pairing is disconnect your USB receiver for a while and re-plug in later on.

No.4: On/Off Switch or Power button on the mouse just drop or loosen in

Many people might have problems with their mouse on/off switch button. Don't worry, this can be fixed as well. You can open the mouse (just look under the battery, there is a single screw). Open the mouse from this screw, and disassembly it carefully. You can see the on/off switch is just around the corner. Now, you can, reattach the button and close the mouse correctly.

No. 5 : Buy a new mouse

I've suggested a way to search for a new wireless mouse with USB Unifying Receiver. For a wireless mouse that allows Unifiying receiver, then you don't worry when your current usb receiver get lost (because, you can always buy a new usb receiver).

Explanation:

6 0
3 years ago
An image is 160x 42 what is this a measure of?
mixas84 [53]
This would be a measure of Resolution. Image size is the general version of Resolution as Resolution is the measurement use FOR image size.
8 0
3 years ago
Other questions:
  • What's the ASCII code for boy ?
    15·1 answer
  • Larry does not want to save his Internet browsing details on his computer what files delete to clear his information from the co
    7·1 answer
  • Yolanda lost her left foot during her military service, but she has been issued a prosthetic that enables her to walk normally,
    13·1 answer
  • Which is an unethical use of technology and resources at the workplace?
    13·2 answers
  • Security administrator for your organization utilized a heuristic system to detect an anomaly in a desktop computer's baseline.
    7·1 answer
  • In this lab, you will create a programmer-defined class and then use it in a Java program. The program should create two Rectang
    14·1 answer
  • I need le help, darn ijourneys
    10·2 answers
  • Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional
    7·1 answer
  • What are input masks most useful for in data validation? moving data from one field to another hiding parts of a value that are
    9·2 answers
  • In a database, what term is used to describe a group of fields that are all associated with and accessed using single primary ke
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!