1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vovikov84 [41]
3 years ago
6

Louis has entered a column of expense values. What feature can he use to insert the total expenses at the end of the column?

Computers and Technology
1 answer:
vovangra [49]3 years ago
5 0
I think it’s B tho I’m not really sure
You might be interested in
Where do you access the status report of an assigned task that is open?
Marina86 [1]

Answer:

I forgot give me time to think abt it cuh

Explanation:

4 0
3 years ago
Read 2 more answers
1.<br> Which of the following is NOT caused by alcohol?
Alla [95]

Answer:

What are the choices

7 0
3 years ago
Read 2 more answers
JAVA
Leokris [45]

Answer:

Answer provided in screenshot, not really too happy with my implementation but it works.

Explanation:

Iterate through months, handling logic for every 12 months to get the raise.

8 0
2 years ago
ANWSER ASAP
Alona [7]

Answer:

Cell wall more selectively controls what goes in and out of the cell, it gives a plant cell its shape, is rigid.

6 0
2 years ago
Discuss the potential problems using biometrics can present to society, and in particular, what effect the loss of biometric rec
tamaranim1 [39]

Answer:

Biometrics in this sense refers to any human information that can be used as unique identifiers such as fingerprints, iris scan, facial scan, voice patterns and typing cadence.

The advantage of biometrics is that they can not be duplicated. That is, two people can never share the same biometric information except if they are clones of each other.  

Given that this kind of unique identifiers can be also be stored as data, it thus creates a cyber risk. If stolen, it may be used to access any part of the user's life. The loss of biometric data to hackers is so detrimental that it can be used to falsify legal documents, identifications documents, or other forms of and even credit card details.

Cheers!

7 0
3 years ago
Other questions:
  • Which of the following is not an algorithm?
    8·1 answer
  • The most commonly used video formats are the mpeg-____ format, the windows media audio/video format, and the audio visual interl
    12·1 answer
  • Assume that a is an array of two or more integers, and that b and c are integers.
    13·1 answer
  • Which of the following are mass communication methods? (Select all that apply.)
    9·1 answer
  • Flash drives, CDs, external disks are all examples of storage (memory) devices.'True or false?
    9·1 answer
  • What do you call the destination router on the network endpoint?
    7·1 answer
  • Which among the following choices is correct based on the two statements listed below? Statement 1: When the lexical analyzer sc
    12·1 answer
  • ___________ key encryption in wep uses the rc4 encryption algorithm.
    9·1 answer
  • (main.c File)
    7·1 answer
  • How do you give brianliest
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!