answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnyKZ [126]
1 year ago
6

Julie is working on a spreadsheet with data about the company's profits. They will be sharing this data with customers. She chec

ks her e-mail and reads a memo that certain data should be kept confidential. She looks over her spreadsheet and sees that she needs to eliminate row 2 and row 3. Julie should _____.
highlight row 2 and row 3 and use the delete command
select B2 and press Delete
highlight row 2 and use the clear command
highlight row 2 and row 3 and make the background black
Computers and Technology
2 answers:
Alika [10]1 year ago
7 0
Julie should highlight row 2 and row 3 and use the delete command.
grigory [225]1 year ago
5 0

Answer: Highlight row 2 and 3 and use the delete command.

Anything that is confidential should not be included in a document that will be released to the customers of a company.

Select B2 and press delete, would just remove the contents of the cell B2.

Highlight row 2 and use the clear command will only remove the contents of the selected rows and leave a blank space.

Highlight row 2 and row 3 and make the background black. This will be one of the worst things you can do, as the customers may have accessibility to edit the contents and simply remove the formatting to see the data hidden in the rows.

You might be interested in
A computer is a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a ser
Bingel [31]

A computer is a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored <u>instructions</u>. The <u>central</u> processing unit of most modern computers is a <u>microprocessor</u>. The instructions that tell a computer how to carry out a task are referred to as computer <u>programs</u>, which are distributed as software. Computers run three main types of software: <u>Application</u> software, system software, and development tools. An example of system software is a computer <u>operating</u> system, which is essentially the master controller for all the activities that a digital device performs. Digital devices are constructed using tiny electronic components that represent data bits as electrical signals. The system unit houses the system board, which contains several <u>integrated</u> circuits made from semiconducting materials. Computers come in three popular form factors: component, <u>clamshell</u> and slate. Many of today's digital devices operate on battery power supplied by <u>Lithium</u> ion batteries. Battery life and lifespan can be extended by following good battery management practices.

<u>Explanation</u>

A computer is a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions. Input is data or information typed, submitted, or transmitted into a computer. Processing data involves performing calculations, drawing graphs, modifying documents, and many more. Output is the result produced by a computer. Processing is handled by the computer’s CPU (Central Processing Unit) and the central processing unit of most modern computers is a microprocessor. A microprocessor executes and manages all logical instructions passed to it and performs tasks involved in computer processing. The instructions that tell a computer how to carry out a task are referred to as computer programs, which are distributed as software. A program is software or set of ordered operations on a computer that performs a particular task or function. A program is created and compiled into a language that the computer can comprehend and then distributed as software. Computers run three main types of software: Application software, system software, and development tools. Application software are programs that help a user carry out a task while a system software helps  the computer system to monitor itself in order to function effectively. On the other hand, development tools are used for creating applications, operating systems, Web sites, and utilities. Digital devices are constructed using tiny electronic components that represent data bits as electrical signals. The system unit houses the system board, which contains several integrated circuits made from semiconducting materials. The essence of digital electronics is the small circuit boards and integrated circuits you see when you open up a digital device. ICs are sets of electronic circuits engraved onto a thin slide of semiconducting material. Computers come in three popular form factors: component, clamshell and slate. Form factor in computer terms refers to the size and dimensions of then device. Clamshell devices have features characterized by a keyboard as the base and a screen on the hinged cover. Those devices configured in the slate form factor have a touchscreen that covers majority of the device’s surface. Many of today's digital devices operate on battery power supplied by Lithium ion batteries. Battery life and lifespan can be extended by following good battery management practices. Many of today's digital devices operate on battery power supplied by Lithium ion batteries. Battery life and lifespan can be extended by following good battery management practices.

7 0
2 years ago
+10 points~~~Which option is used in emails to inform the recipient that they should exercise discretion in accordance with shar
Alexxx [7]

Answer:

Sensitivity Levels

Explanation:

Sensitivity Level is option use in email to inform the recipient that they should exercise discretion in accordance with sharing the content of the message.

8 0
2 years ago
Brittany just pulled up a database table with employee information that contains 50 records of employees at her company. Which o
lesantik [10]

Answer:

The answer is: Operations.

Explanation:

A database operation accesses to information of a relational database. In this case, Brittany has creates the database operation that select employee information of her company and the database has returned a result set. The SQL statement to perform operations on a database are:

  • INSERT
  • SELECT
  • UPDATE
  • DELETE

3 0
2 years ago
Your network administrator finds a virus has been successfully inserted into the network software. The virus itself is now consi
Svetlanka [38]

Answer: Vulnerability of

Explanation:

The network administrator was able to identify that virus before it led to denial of service to users. Since it has been discovered, it is no longer a threat as measures will be taken to eliminate it. But a virus that was successful uploaded shows how vulnerable the system is or how bad the security protections put in place are. Steps has to be taken to ensure it does not reoccur.

7 0
2 years ago
Read 2 more answers
Write a loop that subtracts 1 from each element in lowerScores. If the element was already 0 or negative, assign 0 to the elemen
Xelga [282]

Answer:

The JAVA program to implement for loop for given scenario is shown below.

public class MyProgram {

   public static void main(String args[]) {    

     int len = 5;

     int[] lowerScores = new int[len];      

     lowerScores[0] = 5;

     lowerScores[1] = 0;

     lowerScores[2] = 2;

     lowerScores[3] = -3;      

     System.out.println("The original elements of array are ");

     for(int i=0; i<len; i++)

     {

         System.out.print(lowerScores[i]+" ");

     }      

     System.out.println();

     System.out.println("The modified elements of array are ");

     for(int i=0; i<len; i++)

     {

         // if element is 0 or negative, 0 is assigned to this index

         if(lowerScores[i] <= 0)

           lowerScores[i] = 0;

       // 1 is subtracted from every non zero and positive element

         else

           lowerScores[i] = lowerScores[i] - 1;

           

       System.out.print(lowerScores[i]+" ");

     }

   }

}

OUTPUT

The original elements of array are  

5 0 2 -3 0  

The modified elements of array are  

4 0 1 0 0

Explanation:

The integer array is declared as shown.

int[] lowerScores = new int[len];

The length of the array is given by integer variable len. As per the question, we have taken four elements and size of 5 for the given array.

int len = 5;

The elements of the array are initialized inside the program with the elements given in the question.

lowerScores[0] = 5;

      lowerScores[1] = 0;

The values of the array can be changed to test the program. Also, the size of the array can be changed for testing.

As per the given scenario, if the element is greater than zero, 1 is subtracted from this element. For elements less than or equal to zero, that particular element is assigned the value of 0.

The given program implements if else statement inside for loop for this purpose.

for(int i=0; i<len; i++)

     {

         // if element is 0 or negative, 0 is assigned to this index

         if(lowerScores[i] <= 0)

           lowerScores[i] = 0;

       // 1 is subtracted from every non zero and positive element

         else

           lowerScores[i] = lowerScores[i] - 1;

     }  

5 0
1 year ago
Read 2 more answers
Other questions:
  • Match each function with its possible output.
    7·2 answers
  • When performing actions between your computer and one that is infected with a virus which of the following offers no risk becomi
    5·1 answer
  • ______ is a statistic that measures how quickly the staff corrected a network problem after they arrived at the problem site. MT
    9·1 answer
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    7·1 answer
  • Write an expression that will cause the following code to print "18 or less" if the value of user_age is 18 or less. Write only
    9·2 answers
  • As a digital forensics examiner, it’s a good idea to build a list of references for information on privacy laws in other countri
    13·1 answer
  • Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
    9·1 answer
  • In Section 8.5.4, we described a situation in which we prevent deadlock by ensuring that all locks are acquired in a certain ord
    11·1 answer
  • Suggest how the following requirements might be rewritten in a quantitative way. You may use any metrics you like to express the
    7·1 answer
  • Where can the Field Service Manual containing Critical Callout, Disassembly and Reassembly instructions be found?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!