1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
3 years ago
7

Quick I need help ASAP

Computers and Technology
2 answers:
DiKsa [7]3 years ago
7 0

Answer:

DO NOT INCLUDE (1=) AND DO NOT FORGET TO INCLUDE THE PUNCTUATION.

Explanation:

1 = Spreadsheets are helpful when trying to manage large amounts of numerical data.

2= You might keep a spreadsheet if you keep track of your checkbook balance, the mileage on your car, your grades, or your workout results at the gym.

3= This unit covers the basics of spreadsheets—how to create them; what can be done using formulas and calculations; and how to format them.

Alexeev081 [22]3 years ago
4 0

Answer:

1. Spreadsheets are an essential business and accounting tool. They can vary in complexity and can be used for various reasons, but their primary purpose is to organize and categorize data into a logical format. Once this data is entered into the spreadsheet, you can use it to help organize and grow your business.

2. A spreadsheet is a tool that is used to store, manipulate and analyze data. Data in a spreadsheet is organized in a series of rows and columns and can be searched, sorted, calculated and used in a variety of charts and graphs.

3. ?


GOOD LUCK!

You might be interested in
¿En qué situaciones puedo utilizar formato condicional?
pshichka [43]

Answer:

El formato condicional es una herramienta útil para identificar patrones o tendencias en una hoja de cálculo. Por ejemplo, una regla podría ser: si el valor es mayor que 5.000, que la celda sea amarilla. Así, podrás ver de un vistazo las celdas cuyo valor es superior a 5.000. Puedes usarlo para describir graficas cientificas o Datos matematicos.

Explanation:

El formato condicional facilita el proceso de resaltar celdas o rangos de celdas interesantes, destacar valores inusuales y ver datos empleando barras de datos, escalas de colores y conjuntos de iconos que se correspondan con las variaciones específicas de los datos.

6 0
3 years ago
You can remove selected text from a slide by pressing the CTRL+X keyboard shortcut keys.
Dmitry_Shevchenko [17]

Okayyyyyyyyyyyyyyyyyyyyy

7 0
3 years ago
PLS HEEELLLP ASAP, DONT JOKE
Deffense [45]

Explanation:

Computer viruses are spread through transportable secondary storage.e.g, inserting a hard disk that already has virus into another computer.

7 0
3 years ago
Read 2 more answers
A network technician needs to set up two public facing web servers and watns to ensure that if they are compromised the intruder
Taya2010 [7]

Answer:

D. Place them in the demilitarized zone.

Explanation:

Demilitarized zone(DMZ) is a logical or physical sub network that contains and gives exposure to an organization's external-facing services to an not trust worthy network, basically a larger network like Internet. It's purpose is to add an extra layer of security in an organization's LAN(local area network).So we conclude that DMZ is best way so that intruder cannot access the intranet.

4 0
3 years ago
Which type of security measure reduces the likelihood of a deliberate attack?​
valentinak56 [21]
Anti-Virus and anti malware also the anti addwear
4 0
3 years ago
Other questions:
  • How long does it take 2 consultants to create a slide deck of 120 slides, assuming one consultant make 2 slides per hour?
    8·1 answer
  • You would like to create a graph that shows how much of your total investments are in stocks, savings, and mutual funds. You sho
    5·2 answers
  • When you add text to a slide using presentation software, which of the following is important?
    12·2 answers
  • Where does communication take place?
    12·1 answer
  • Write a program to find a peak in an array of ints. Suppose the array is {-1, 0, 2, 5, 6, 8, 7}. The output should be "A peak is
    14·1 answer
  • Which best explains a password attached to a document
    9·1 answer
  • The QWERTY keyboard is the most common layout of keys on a keyboard. <br> a. True<br> b. False
    8·2 answers
  • Assume a TCP sender is continuously sending 1,090-byte segments. If a TCP receiver advertises a window size of 5,718 bytes, and
    7·1 answer
  • Select three advantages of cloud computing.
    10·1 answer
  • When you type in text in an image in a photo-editing software, where is it created?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!