What is the default setting Excel shows when Insert is clicked?

shift cells right
shift cells down
entire row
entire column

Answers

Answer 1

Answer:

B. shift cell down

Answer 2

The default setting Excel that shows when Insert is clicked is shift cells down. The correct option is B.

What is Excel?

Microsoft's Excel spreadsheet program is a part of the Office family of business software programs.

Users of Microsoft Excel may format, arrange, and compute data in a spreadsheet.

Large volumes of data are stored, examined, and reported using Excel. It can be used by any expert to manage lengthy and awkward datasets, although accounting teams frequently utilize it for financial analysis.

Making the first decision that will be made automatically is setting something as default. Shift cells down is the default setting Excel displays when Insert is clicked.

Thus, the correct option is B.

For more details regarding excel, visit:

https://brainly.com/question/3441128

#SPJ2


Related Questions

You are calculating commissions for sales staff at work. Employees receive ten dollars for every item sold. Your boss also wants to know the grand total paid to all employees as commission. How would you set this up in an Excel workbook and would you use absolute references, relative references, or both?

Answers

Answer:

To find the grand total paid to all employees as commission, we note the following;

The amount received by employees as commission for each item sold, r = $10.00

The information the boss wants to know = The grand total paid to all employees as commission

Let 'n' represent the the total sales, we have;

The grand total commission = Total sales × Commission

1) On MS Excel, four columns are created, labelled, Serial number, Employee Name, Number of Items Sold, Commission

2) In the second row, in the cell under the Commission column heading, Input the formula '=(Cell reference of adjacent Number of Items Sold) × 10' in the cell

3) Copy the the above formula to all the cells in the Commission column by clicking on the cell containing the formula, moving the mouse to the bottom right corner of the cell, and when the mouse pointer changes to a cross sign, left click and hold and drag to all the cells in the column

4) Input the formula =SUM(Argument) in the blank cell below the created Commission list

Where;

Argument = The reference to the range of cells containing the values in the Commission column

5) The output of the =SUM formula is the grand total paid to employees as commission

Explanation:

please answer this question​

please answer this question

Answers

Answer:surfing, printer

Explanation:

Open the code8-3_anim.css file. Several keyframe animations have already been created for you. Add a keyframe animation named spinCube that contains the following frames:

At 0% apply the transform property with the rotateX() function set to 24deg and the rotateY() function set to 40deg.
At 50% change the value of the rotateX() function to 204deg and the rotateY() function to 220deg
At 100%, change the value of the rotateX() function to 384 and the rotateY() function to 400deg.

Answers

In code 8-3 anim.css, include a keyframe animation called spinCube with frames at 0%, 50%, and 100%. The transform property's rotateX() and rotateY() values should be set to various values.

In CSS, how do you add keyframe animation?

Create a keyframes rule with a name to use keyframes, and the animation-name property will use that name to link an animation to a keyframe declaration.

Which CSS attribute chooses an animation for an element when the keyframes rule is applied?

a property called animation-name. A list of applicable animations is defined by the animation-name parameter. The keyframe at-rule that gives the property values for the animation is chosen using each name.

To know more about code  visit:-

https://brainly.com/question/17293834

#SPJ1

Which type of information includes personal payroll medical and operational information.

Answers

Personal payroll, medical, and operational information are examples of "sensitive" information.

What is meant by sensitive information?

Sensitive data as information that must be protected from unauthorized access as well as unwarranted disclosing in order to maintain an individual's or organization's information security.

Sensitive information, unlike public information, is not gathered from unrestricted directories and excludes any changes are passed lawfully accessible to the general population from government records. This means that exposing sensitive data may result in financial as well as personal harm. Personal information, also known as PII (personally identifiable), is any data that may be linked to a particular individual and is used to enable identity theft. Knowing a person's Social Security number and mother's maiden name, for example, makes it easier to obtain a credit card in their name.

Thus, personal payroll, medical, and operational information are examples of "sensitive" information.

To know more about the sensitive information, here

https://brainly.com/question/26959476

#SPJ4

let g = ( v , e ) be an undirected graph where v = { a , b , c , d , e , f , g , h }

Answers

g = ( v , e ), where v = { a , b , c , d , e , f , g , h } is an undirected graph. Here are the definitions of undirected graph, vertices, and edges:

An undirected graph is a graph in which all edges are bidirectional, or in other words, there is no direction for an edge.Edges:An edge is a line between two vertices that represents a connection between two vertices.

Vertices:Vertices are a set of points in which each point represents an object, person, or node. They are also known as nodes. An undirected graph is graph, i.e., a set of objects (called vertices or nodes) that are connected together, where all the edges are bidirectional. An undirected graph is sometimes called an undirected network. In contrast, a graph where the edges point in a direction is called a directed graph.

Let's add some edges to our graph (g).Below is the graph, g with all the edges connected:We now have a fully connected graph with 8 vertices.

Learn more about undirected graph at

brainly.com/question/13198984

#SPJ11

Design a program that has a two-dimensional integer array with 7 rows and 7 columns. The program should store a random number in each element. Then, the program should search the array for saddle points. A saddle point is an element whose value is less than or equal to all the other values in the same row, and greater than or equal to all the other values in the same column.

Answers

Answer:

#include <stdio.h>

#include <stdlib.h>

#include <math.h>

int saddle_Point_Value(int n, int arr[n][n])

{

int row, col = 0;

int k;

for (int i = 0; i < n; i++) {

    row = arr[i][0]

    col = 0;

    for (int j = 1; j < n; j++) {

        if (row > arr[i][j]) {

            row = arr[i][j];

            col = j;

        }

    }

    for (k = 0; k < n; k++) {

       if (row < arr[k][col])

           break;

    }

    if (k == n) {

        printf("\nThe saddle point value is : [%d]\n", row);

        return 1;

    }

  }

  return 0;

}

int main()

(

   int n = 7

   int arr[n][n];          //Declaring 7 x 7 array

   int i, j;

   //Creating random numbers

   for (i = 0; i < n; i++) {

      for (j = 0; j < n; j++) {

         arr[i][j] = rand()%50; //Random numbers up to...

      }

   }

   printf("\n Array elements :\n ");

   for (i = 0; i < n; i++) {

      for (j = 0; j < n; j++) {

         print("%d\t", arr[i][j]);

      }

      print("\n");

   }

   if (!(saddle_Point_Value(n, arr)))

        printf('No Saddle Point.!!\n");

   return 0;

}

Explanation:

A properly functioning and running code is written in the answer. Just follow the steps.

when configuring the ssh daemon using the /etc/ssh/sshd config file, which options can be set to either prevent or allow unrestricted access to all gui features on the client? (select two).

Answers

The main configuration source for the SSH daemon itself is in the /etc/ssh/sshd config file. Note that this is different from the ssh_config file, which specifies client-side default settings.

sshd_config is the OpenSSH server configuration file. ssh_config is the OpenSSH client configuration file. Specifies which environment variables sent by the client are copied to the session's user environment. Specifies the IP address family used by sshd. Valid arguments are:

any , inet (IPv4 only), inet6 (IPv6 only). When a user runs her ssh, scp, or sftp command, it starts a Secure Shell session. A new sshd daemon is forked for each incoming connection. The fork daemon handles key exchange, encryption, authentication, command execution, and data exchange with clients.

Learn more about configuration here-

https://brainly.com/question/14307521

#SPJ4

can we save 2 MS Word documents with same names.​

Answers

Answer:

No, they have different names

Explanation:

The only way to have two rocuments with the same name is if you are creating a dublicate document.

You took a picture of the beach, and there's a seagull sitting in the sand that you want to remove. What do you use to draw and AUTOMATICALLY remove the seagull, replacing it with more sand?

Answers

Answer: You can use a special type of editor to remove anything you want, and have that place filled in so its not blank space.

BUT: I am not sure of a specific one.

1. Which of the following equations describes the encryption process for RSA?

P=Cd % n

y2 = x3 + Ax + B

Me % n

De % n + B

Answers

The equation that describes the encryption process for RSA is P=Cd % n.

What is RSA?

RSA (Rivest–Shamir–Adleman) is a public-key encryption algorithm that can be used to encrypt and decrypt data over the internet. It was invented by Ron Rivest, Adi Shamir, and Leonard Adleman in 1977.RSA Encryption ProcessThe RSA encryption process is based on the mathematical concept of prime factorization.

The following are the steps involved in the RSA encryption process:

Step 1: Choose two distinct prime numbers p and q. These should be kept secret.

Step 2: Compute n=pq. This value is known as the modulus.

Step 3: Compute Φ(n)=(p−1)(q−1).

Step 4: Choose an integer e (1 < e < Φ(n)) such that gcd(e, Φ(n)) = 1. This value is known as the public key exponent.

Step 5: Compute d, which is the modular multiplicative inverse of e mod Φ(n), or mathematically, de = 1 mod Φ(n). This value is known as the private key exponent.

Step 6: The public key is (n, e). This is known to everyone.

Step 7: The private key is (n, d). This is kept secret.

Step 8: To encrypt a message, say M, the sender represents the plaintext as a number, which is less than n.

Let P be this number. The sender then calculates the ciphertext C as follows:

C = P^e mod n

Step 9: To decrypt the ciphertext, the receiver computes the plaintext P as follows:

P = C^d mod n

Thus, the equation that describes the encryption process for RSA is P=Cd % n.

Learn more about RSA (Rivest–Shamir–Adleman) at https://brainly.com/question/31717969

#SPJ11

Make Your Own Flowchart

Answers

Answer:

https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcS5V59B3u23rfG-bXj8jNoV7rXfV62cyPnkcg&usqp=CAU

an example of a flow chart

Explanation:

how many pins does a ddr3 sodimm have

Answers

A DDR3 SODIMM has 204 pins.

DDR3 SODIMM, also known as DDR3 Small Outline Dual Inline Memory Module, is a type of computer memory module primarily used in laptops and other small form factor systems. It is a low-power variant of the DDR3 memory module, and usually has a pin count of 204. The module is designed to be easily inserted into a SODIMM slot, which is typically found on the underside of a laptop.

The DDR3 SODIMM is an ideal solution for laptop users who need a high-performance, low-power memory module. Its small form factor and low power consumption make it an ideal solution for portable devices, while its high performance ensures that it can handle even the most demanding applications.

You can learn more about DDR3 SODIMM at

https://brainly.com/question/31920807

#SPJ11

if you were giving a presentation there were 35 people in the room including yourself and you were to shake every person's hand in the room would you shake 35 hands. is it true or false?​

Answers

Answer:

False, unless you were to shake your own hand.

Explanation:

In a data warehouse that uses a dimensional design, a studentid column is found in which table?

Answers

A dimension table is a table in a data warehouse's star schema. A dimension table keeps the dimensions or qualities that define the items in a fact table. In data warehousing, a dimension is a group of references data about a quantifiable event.

What exactly do a fact table and a dimension table do?

A dimension table contains information on the various ways the fact table's data can be studied, while a fact table contains the data that will be evaluated.

An explanation of Type 2 dimension tables

Because it allows you to track historically important features, type 2 is the most popular sort of slowly changing dimension.

To know more about dimension table visit :-

https://brainly.com/question/13106855

#SPJ4

Please help me on this

Please help me on this

Answers

Runs application layer - proxy firewall
Monitors data packet - packet filter firewall
Examines network connections - state fuel inspection firewall

This is what is think.

A bit pattern is shown below.
01001110
Convert the bit pattern into decimal

Answers

Answer:

78

Explanation:

I always convert to hexadecimal first:

0100 = 4

1110 = E

(the matching of groups of 4 bits to one hex char is a lookup you can memorize)

so we have 4E, which is 4*16+14 = 78

Of course you can also go the long route:

01001110 = 0·2⁷+1·2⁶+0·2⁵+0·2⁴+1·2³+1·2²+1·2¹+0·2⁰ = 78

a bubble sort is being used to arrange the following set of numbers in ascending order: 7 5 3 9 2 6 after the first pass of the sort is completed, what order will the data be in?

Answers

After the first pass of the Bubble Sort algorithm, the largest number in the set will "bubble" up to the end of the list.

Here's the step-by-step process of the first pass:

Compare 7 and 5. Since 7 is greater than 5, swap them: 5 7 3 9 2 6

Compare 7 and 3. Since 7 is greater than 3, swap them: 5 3 7 9 2 6

Compare 7 and 9. Since 7 is smaller than 9, no swap is needed: 5 3 7 9 2 6

Compare 9 and 2. Since 9 is greater than 2, swap them: 5 3 7 2 9 6

Compare 9 and 6. Since 9 is greater than 6, swap them: 5 3 7 2 6 9

After the first pass, the largest number (9) has moved to the end of the list. The order of the data will be: 5 3 7 2 6 9During the first pass of the Bubble Sort algorithm on the given set of numbers (7, 5, 3, 9, 2, 6), adjacent pairs of numbers are compared and swapped if necessary. After the first pass, the largest number "bubbles" up to the end of the list. In this case, 9 is the largest number, and it moves to the end. The resulting order after the first pass is 5, 3, 7, 2, 6, 9. Bubble Sort continues with subsequent passes until the entire list is sorted in ascending order.

Learn more about bubble sort here : brainly.com/question/30395481
#SPJ11

someone help me please and thank you

someone help me please and thank you

Answers

The Creative Commons license allows creators to specify how others can use their work.

It offers options for attribution, non-commercial use, share-alike, and no-derivative works to protect intellectual property and encourage collaboration. See further explanation below.

What is the rationale for the above response?

Attribution: Someone might want to use this part of the Creative Commons license because it ensures that they receive credit for their work. This is important for creators who want recognition for their efforts and to be acknowledged for their intellectual property. By requiring attribution, creators can also prevent others from taking credit for their work.

Non-Commercial: Someone might want to use this part of the Creative Commons license to prevent others from using their work for commercial purposes. This may be important for creators who do not want their work to be used in advertisements or to be sold for profit. By limiting commercial use, creators can maintain control over their work and ensure that it is being used in accordance with their values.

Share-Alike: Someone might want to use this part of the Creative Commons license to encourage collaboration and innovation. By requiring users to share any new versions of the work under the same license, creators can ensure that their work remains open and accessible to others. This can promote creativity and encourage others to build upon existing work.

No Derivative Works: Someone might want to use this part of the Creative Commons license to protect the integrity of their work. By prohibiting changes to the work, creators can maintain control over how their work is presented and ensure that it is not altered in a way that they do not approve of. This can be important for creators who are concerned about how their work is being used and want to maintain control over its message.

Learn more about Creative Commons at:

https://brainly.com/question/29247019

#SPJ1

T/F with a cell in edit mode, you can edit part of the contents directly in the cell and keep part, such as correcting a spelling error.

Answers

True (T).With a cell in edit mode, you can edit part of the contents directly in the cell and keep part, such as correcting a spelling error. While typing into a cell, if you click elsewhere in the worksheet, that's called canceling the edit of the cell. If you press the Enter key, the edit is finished, and the content of the cell is changed. If you press the Esc key, the cell's content remains the same and the edit is canceled.

With a cell in edit mode, you can indeed edit part of the contents directly within the cell while keeping the remaining content intact. This allows for making specific changes or corrections within the cell without overwriting or modifying the entire contents.

For example, if you have a cell with the text "The quick browwn fox jumps over the lazy dog," and you notice a spelling error in "brown," you can activate the cell's edit mode and directly modify only the misspelled word without retyping the entire sentence. Once you make the necessary correction, you can exit the edit mode, and the modified part will reflect the updated content while the rest of the text remains unchanged.

Learn more about edit mode

https://brainly.com/question/1250224

#SPJ11

Select the correct answers.
Which are the benefits of leveraging web technologies?
processing of large amounts of data
more manpower
better marketing and customer service
increased production costs
difficulty in handling customer complaints

Select the correct answers.Which are the benefits of leveraging web technologies?processing of large

Answers

Answer:

Explanation:

Select the correct answers.

Which are the benefits of leveraging web technologies?

1) Processing of large amounts of data

2) Better marketing and customer service

The _______ is used to change the date Auto Fill option.
A. Fill Tag
B. Tag
C. Smart Fill
D. Smart Tag

Answers

I assume you are talking about Excel?. You first--enter your initial date on the first cell and click the cell with the first date to select it, then drag the fill handle.

Name the substance you think is in the cylinder that you cannot see and prevents the plunger from going all the way in even when you push the plunger hard

Answers

The substance I think is in the cylinder that you cannot see and prevents the plunger from going all the way in even when you push the plunger hard is Air.

What do you feel as when one push the plunger?

When a person push on the plunger, the person can feel the air pushing it back. When a person has stop pushing, the air inside the syringe will tend to return to its normal size.

Note that there are a lot of ways to compress air. A person can do so by  squeezing  a specified volume of air into a smaller space.

Learn more about cylinder from

https://brainly.com/question/26806820

a hierarchical network topology in which each device is connected to a central node, either directly or through one or more other devices, is also called a(n) network.

Answers

A hierarchical network topology in which each device is connected to a central node, either directly or through one or more other devices, is also called Tree network.

A form of network architecture known as a "tree topology" has a root node at the top and leaves at the bottom, like a tree. Tree topologies are frequently used in computer networking to generate virtual LANs (VLANs). Tree topology is a sort of network architecture used in computer networking that resembles a tree. Each node in a tree topology is connected to the center node (the "trunk") by a single path, and there is one central node. Nodes might be compared to the branches that emerge from the stem. Large networks are frequently built using tree topologies. Computer networks are among the most typical environments in which a tree topology is used. In a home or small business, tree topology is frequently used to link several devices, including PCs and printers. In bus networks, where every device is connected to a central server, tree topology is frequently utilized.

Learn more about the Tree topology with the help of the given link:

https://brainly.com/question/15066629

#SPJ4

how to fixed uncaught error: call to a member function query() on null in C:\xampp\htdocs\ta\tambahkue.php:245 Stack trace: #0 {main} thrown in C:\xampp\htdocs\ta\tambahkue.php on line 245?

Answers

The error "Uncaught error: Call to a member function query() on null" in the file "tambahkue.php" indicates that you are trying to call the method "query()" on a null object.

In PHP, this error occurs when you attempt to call a method on an object that has not been instantiated or is null. In this case, the error is specifically happening on line 245 of the "tambahkue.php" file. To fix this issue, you need to ensure that you have properly instantiated the object before calling its methods.

First, check if you have created an instance of the object that contains the "query()" method. It could be a database connection object or a custom class object. Make sure that the object is properly initialized using the appropriate constructor or method.

If you are using a database connection object, verify that the connection to the database has been established before calling the "query()" method. Ensure that you have invoked the correct method to establish the connection and assigned it to the object.

In summary, the "Uncaught error: Call to a member function query() on null" error occurs when you try to call the "query()" method on a null object. To fix it, ensure that you properly initialize the object before calling its methods and establish any necessary connections before using them.

Learn more about member function here:
https://brainly.com/question/32008378

#SPJ11

What type of software can you run to help fix computer problems?

Answers

Answer:

IOBit Driver Booster.

Explanation:

First, you want to make sure your computer is entirely updated. You can go into your settings, to do so.

If this doesn't solve the problem, here are some other alternatives, they're free repair tools.

IOBit Drive Booster

FixWin 10

Ultimate Windows Tweaker 4

O&O ShutUp10

Which of the following is one of the tools in REPL.it that helps prevent syntax errors?
It adds closing quotes and parentheses if you type the opening ones.
It changes your binary input to the decimal system.
It allows you to see the interpreter’s algorithm.
It limits the pixel resolution.

Answers

Answer:

A. It adds closing quotes and parentheses if you type the opening ones.

Explanation:

Answer:

Yes the answer is A got a 100% hope you get a 100% too have a good day:)

Explanation:

MULTIPLE COICE! BRAINLIEST
When using design templates, these elements will be determined for you.
bullets
background
color scheme
content
title
font

Answers

Answer:

background

Explanation:

The physical equipment
The programs used to run the network
Part of the network that allows communication with other networks
Routes data where it is meant to go

Answers

Answer: hardware, software, gateway, router

Explanation:

Got it right on e2020

write any two rules for writing algorithm​

Answers

Answer:

1) = input and output should be defines precisely

2) = it shouldn't include computer code

user downloads a widget onto his android phone but is puzzled to see that when the widget is touched an app is launched. what is a possible cause?

Answers

Answer:

Explanation:

A possible cause for the behavior where touching a widget on an Android phone launches an app could be that the widget is incorrectly configured or associated with the wrong app.

Widgets on Android devices are intended to provide quick access to specific functions or information without opening the full application. They are typically placed on the home screen or in a widget panel. When a user interacts with a widget, it should perform the designated action associated with that widget.

If touching a widget launches an app instead of performing the expected action, it suggests that the widget's configuration may be incorrect. The widget may be associated with the wrong app, resulting in the app being launched instead of the intended widget behavior.

To resolve this issue, the user can try the following steps:

1. **Remove and Re-add the Widget**: Remove the problematic widget from the home screen or widget panel and re-add it. This can sometimes refresh the widget's settings and resolve any misconfigurations.

2. **Check Widget Settings**: Some widgets have settings that allow customization of their behavior. The user should verify the widget's settings to ensure they are correctly configured for the desired action.

3. **Reinstall the Widget or App**: If the issue persists, uninstalling and reinstalling the widget or the associated app can help resolve any underlying software conflicts or issues.

4. **Contact App Developer**: If the problem continues, reaching out to the app developer or widget provider for support can provide further assistance in troubleshooting the issue.

It's important to note that the specific cause can vary depending on the widget, app, and device configuration. The steps above provide general guidance to address the issue of a widget launching an app instead of performing its designated action.

Learn more about  widget here:

https://brainly.in/question/17825063

#SPJ11

Other Questions
solve 2(12+3x)=42answe The cost of potataoes is Rs 42 how many kg potato can be purchased in Rs 96? In a certain fraction, the numerator is 4 less than a denominator. If 5 is added to both the numerator and denominator, the resulting fraction is equal to 6/10. Find the original fraction. What is the sum of 3/8 and (1/6)? I will give brainliest Which line best describe the relationship between Prometheus and the people? Draw every stereoisomer for 1,2-difluoro-1,2-dimethylcyclopentane. Use wedge-and-dash bonds for the substituent groups, and be sure that they are drawn on the outside of the ring, adjacent to each other. I like cupcakes I ate one at the party For what values of x is the inequality below true?6x-2 10 52 divided by 4 is k. What is the significance of globalization (e.g., magnitude, impacts, etc.)? Most importantly, what may globalization mean to you and others you know, (i.e., how might it impact your future in terms of your career and quality of life?) a capacitor drawing 8 kvar is placed parallel with an electromagnet that draws 3kw of active power and 4 kvar of reactive power. what effect does this have on the reactive power q provided by the ac power source and the power factor cos. The risk-free rate is 2.29% and the market risk premium is 6.25%. A stock with a of 1.50 just paid a dividend of $1.98. The dividend is expected to grow at 23.45% for five years and then grow at 4.52% forever. What is the value of the stock? pLS HURRY!!!This area model shows the quotient of 1/5+4What is the quotient?Enter your answer as a fraction in simplest from byfilling in the boxes. a competition between a given substance and its dissolved species is ? The sum of 2 numbers is 20 their difference is 4 what are the 2 numbers in poker, a royal flush is a hand with the ace, king, queen, jack and 10 of all one suit and is the best possible hand in the game. what is the probablity of a royal flush in a 5 card hand 3x 4\5 answers 4\15, 7\5, 12\5, 12\15 Once capacity requirements are determined, the organization must decide whether to produce a good or service itself or outsourceFactors to consider:Available capacityExpertiseQuality considerationsThe nature of demandCostRisks Would water still be a polar molecule if it were not in the form of a v but rather were linear like carbon dioxide? The outside dimensions of a component with no axial or cylindrical symmetry (e.g., an engine block) need to be manufactured to tight tolerances. Select an appropriate machining process. a Turning b Milling c Drilling d Planing