answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnyKZ [126]
2 years ago
6

Julie is working on a spreadsheet with data about the company's profits. They will be sharing this data with customers. She chec

ks her e-mail and reads a memo that certain data should be kept confidential. She looks over her spreadsheet and sees that she needs to eliminate row 2 and row 3. Julie should _____.
highlight row 2 and row 3 and use the delete command
select B2 and press Delete
highlight row 2 and use the clear command
highlight row 2 and row 3 and make the background black
Computers and Technology
2 answers:
Alika [10]2 years ago
7 0
Julie should highlight row 2 and row 3 and use the delete command.
grigory [225]2 years ago
5 0

Answer: Highlight row 2 and 3 and use the delete command.

Anything that is confidential should not be included in a document that will be released to the customers of a company.

Select B2 and press delete, would just remove the contents of the cell B2.

Highlight row 2 and use the clear command will only remove the contents of the selected rows and leave a blank space.

Highlight row 2 and row 3 and make the background black. This will be one of the worst things you can do, as the customers may have accessibility to edit the contents and simply remove the formatting to see the data hidden in the rows.

You might be interested in
Your computer has gradually slowed down. What's the most likely reason?
sweet-ann [11.9K]
It could be old ... could be your connection to the internet... could be a virus. You can go to walmart or your super store and buy a usb for your computer. There are ones that can speed up your computer. I had to buy it for mine and it worked. It might be over 20 dollars depends on where you go.
8 0
2 years ago
__________ is the current federal information processing the standard that specifies a cryptographic algorithm used within the U
Free_Kalibri [48]

Answer:

FIPS 140-2 es el acrónimo de Federal Information Processing Standard (estándares federales de procesamiento de la información), publicación 140-2, es un estándar de seguridad de ordenadores del gobierno de los Estados Unidos para la acreditación de módulos criptográficos. ... El Instituto Nacional de Estándares y Tecnología (NIST)

Explanation:

8 0
2 years ago
Write a method called printRangeOfNumbers that accepts a minimum, maximum numbers as parameters and prints each number from mini
timama [110]

Answer:

The method in python is as follows:

class myClass:

    def printRange(min,max):

         for i in range(min, max+1):

              print("{"+str(i)+"} ", end = '')

           

Explanation:

This line declares the class

class myClass:

This line defines the method

    def printRange(min,max):

This line iterates from min to max

         for i in range(min, max+1):

This line prints the output in its required format

              print("{"+str(i)+"} ", end = '')

5 0
2 years ago
Pressing and holding _______ while clicking enables you to select multiple contiguous files or folders.
liq [111]

Answer:

Hi LizBiz! The answer is Ctrl key on Windows, or Command key for Mac.

Explanation:

The Ctrl (Windows) key or equivalent Command key on Mac has a special purpose which allows special operations to be performed when combined with another action, such as clicking on multiple pictures or files for selection.

8 0
2 years ago
In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
Sedaia [141]

Answer:

Its c

Explanation:

5 0
2 years ago
Other questions:
  • which of these paste options is commonly available from the paste options button? A> use the destination them. B. keep the em
    14·2 answers
  • Write a method named lastFirst that accepts a string as its parameter representing a person's first and last name. The method sh
    13·1 answer
  • The bit width of the LRU counter for a 32 KB 16-way set associative cache with 32 Byte line size is
    13·1 answer
  • Dillard’s wants to learn about its consumers' attitudes toward online purchases. There are numerous studies that are available a
    9·1 answer
  • Design two subclasses of Employee…SalariedEmployee and HourlyEmployee. A salaried employee has an annual salary attribute. An ho
    12·1 answer
  • How can a signature be added to an email message? Check all that apply.
    10·2 answers
  • Describe the indicators and hazards of a metal deck roof fire in an unprotected steel joist warehouse as well as the techniques
    6·1 answer
  • Please can someone help me answer this question.
    11·1 answer
  • Exponentiation Is a/an operater?​
    15·1 answer
  • A data scientist is writing a Machine Learning (ML) algorithm using a large data set.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!