Which Excel feature should you use to only show values in a column that fit certain criteria?

Answers

Answer 1

Answer:use input

Explanation:


Related Questions

It was brought to Dennis's attention that some of his employees' e-mail practices were unethical. Read the scenarios described below and identify the unethical practices.


Darlene sends a memo to all employees outlining the new procedure for tracking inventory in the database.

Luke sends out an e-mail to co-workers asking them to sponsor him in a walkathon next month.

Nancy sends the latest computer jokes out to all the company's employees to brighten their day.

Bob forwards a customer inquiry to the sales representative assigned to the account.

Answers

Answer:

Answer: B (Luke sends out an e-mail to co-workers asking them to sponsor him in a walkathon next month.)

Explanation:

The answer would be B, if you can add multiple then C could also fall under the unethical catoagory.

To navigate through your presentation slides, which key on your keyboard can you use?
Dankonace

Answers

Answer:

You use your arrow keys

Explanation:

Answer:

Space bar

Explanation:

(04.06 LC)

To navigate through your presentation slides, which key on your keyboard can you use?

Group of answer choices

Backspace

Tab key

Space bar

Enter key

pls help have absolutely no clue how to delete this

Answers

Answer:

is that a picture or a file if it's a file then touch the pad with two fingers

if a picture then i don't know  

Explanation:

Answer:

not sure if this will mess anything up but try to run cmd as admin and del that folder

Explanation:

can someone help me solve this pls

Answers

Answer:

1. Textbox

2. Button

3. Boolean

Which operating system (OS) is used to run your laptop?

Answers

Answer:

Windows or Linux

Explanation:

It would most likely be windows but theres not enough information to make a sure decition.

Answer:

The most known one are, macOS, Windows, and Linux.

Bonus: The most known smartphone operating systems are Android and iOS

Explanation:

Which type of programmer writes code for operating systems?
A.
application programmer
B.
web programmer
C.
game tools programmer
D.
system programmer <------ Correct
E.
artificial intelligence programmer

Answers

Answer:

d.is the correct answer

Answer:

Answer is D.

Explanation:

In the list [0, 13, 5.4, "integer"], which element is at index 2?
A.0
B.13
C.5.4
D.“integer”

Answers

Answer: C) 5.4

The index starts at 0

index 0 = 0index 1 = 13index 2 = 5.4index 3 = "integer"

If there are n elements in a list, then the index ranges from 0 to n-1.

To step through a program, what status indicator light needs to be on?

Answers

Answer: It should always stay on normal

Explanation:

Hope this helped :)

Which column and row references are updated when you copy the formula f$3/15

Answers

Answer: Column F

Explanation: In Microsoft excel, for the sake of robustness and to aid the effectiveness of updating formulas across cells. The reference of cells are treated as relative which means that when formulas are copied across columns or within rows, they get updated automatically. However, some numbers may be treated as constants such that we do not want them to change or be updated as we move acisss cells. Thus, such numbers are treated Given absolute references, which is made possible by adding a '$' prefix before the colum alphabet or row number or both. in the scenario given above, the row has the $ prefix, hence, it is absolute and will not change but the column alphabet does not and hence, treated as relative.

What are the steps to insert an image into an email message place the steps in the correct order

Answers

Answer:

1. Start a new message

2. click the insert tab.

3. look for the illustrations command group

4. click pictures

5. browse, select, and insert your choice

Explanation:

Most presentations use text: A. To draw attention to content
B. At a minimum
C. Without restraint
D. To maximize area and style

Answers

i think it’s c hope this helps

Austin works as a department head and frequently uses presentations to deliver information to his staff. He relies heavily on presentation technology because of its many benefits, which include _____.



ensured accuracy


visual appeal


work can't be lost


fast creation


ease of updating

pls help

Answers

Answer: ensured accuracy

Explanation:

Answer:visual appeal, ease of updating, fast creation

Explanation:

Differentiate Between
Master file and transaction file

Answers

Master file contains records of permanent data types and transaction files contains data which is used to update the records of master file for example address of the costumer etc.

Click this link to view O*NET's Skills section for Biomedical Engineers. Note that common skills are listed toward the top and less common skills are listed toward the bottom. According to O*NET, what are some common skills needed by Biomedical Engineers? Check all that apply. fine arts science complex problem solving critical thinking judgment and decision making building and construction

Answers

Answer:

Science

complex problem solving

critical thinking

judgment and decision making

Explanation:

im on endunety

Science, complex problem-solving, critical thinking and judgment and decision-making are some common skills needed by Biomedical Engineers. Hence, option B, C, D, and E are correct.

What is Biomedical Engineers?


In order to create new tools and machinery for enhancing human health, biomedical engineers concentrate on developments in technology and medicine. For instance, they might create computer simulations to evaluate new pharmacological regimens or software to run medical equipment.

One of the engineering fields with the highest growth is the relatively young field of biomedical engineering. The demand for qualified biomedical engineers to fill the gap created by technological breakthroughs and the desire for more advanced, creative healthcare is on the rise. The greatest engineering jobs list places biomedical engineering at number five.

Biomedical engineering is one of the most challenging engineering disciplines because it involves a lot of chemistry and biology coursework. While many engineering majors concentrate on physics, this one demands considerably more.

Thus, option B, C, D, and E are correct.

For more information about Biomedical Engineers, click here:

https://brainly.com/question/11617187

#SPJ5

aux Which of the following is the best name for a history report about World War I? (6 points)​

Answers

Answer:

The best name of a history report for world war I:  The Great War

Explanation:

Based on what I learned in my past history classes, World War I was also known as The Great War. It was the most deadliest war in American history

Answer:

6 points

Explanation:

In a ______, the bars that represent the categories of a variable are spaced so that one bar is not directly next to another; whereas in a ______, the bars actually touch one another.

Answers

Answer:

The correct answer would be "bar graph; histogram".

Explanation:

The bar graph has become a photographic arrangement of information which always practices that relate bars to consider various give information. Alternatively, this is indeed a diagrammatic comparative analysis of univariate data. This same histogram demonstrates the variation including its frequency of repeated measures, introduces numerical information.

30 POINTS, ON A TIMER HELP ASAP

your answer will be removed if you steal my points!!

The history of the Internet dates back to the 1960s, when a group of scientists at Stanford University were entrusted to design which of the following as part of the competition between the US and its then Cold War enemy, the USSR?


a network of sophisticated computers

a mainframe to siphon information

a computer to control weapons

a super computer for the US government

Answers

b is not the answer

for c the goverment  dont  need a comptor to control weopons they have a briefase.      

for a it dont  make sense in that time

so it d pls mark barinliest    

An author’s qualifications are important in determining whether a media source is...

credible.
relevant.
valid.
copyrighted.

Answers

Answer:

An author's qualifications are important in determining whether a media source is;

Credible

Explanation:

In order to find out about the credibility of an author, the preface, forward, and or introduction including the book's back cover should be checked for the author's credentials, qualifications and areas where the author is an expert

The author's credential can also be checked by finding out about other books the author has written and also about the author's biography.

Answer:

a) credible.

Explanation:

Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environments. C. Their levels can be completed quickly. D. They are typically played for several hours at a time. E. They are played on large screens.



game development

Answers

Answer:

c

Explanation:

The statements regarding mobile games that is true is that their levels can be completed quickly.

What is mobile games?

Mobile games are known to be games that have been set up for mobile devices, such as smartphones.

Note that Mobile games can be seen from basic to hard levels and as such, The statements regarding mobile games that is true is that their levels can be completed quickly.

Learn more about mobile games from

https://brainly.com/question/917245

#SPJ2

Which of the following is a visual thinking tool that aids students in organizing ideas through analysis, synthesis, and comprehension?


mind map

outliner

outline

drawing

Answers

Answer:

mind map hope this help

Explanation:

The answer is:

mind map

help with this please anyone
Keywords:
-Virus
-Spyware
-Worm
-Trojan Horse
Definitions:
-This type of malware pretends it will be useful and it is a safe program when it will actually try and attack your device.
-This type of malware can copy itself hundreds of times so can hard your device very quickly.
-A type of malware that spreads through normal program.It could simply slow down your device down or cause you to lose all access to programs on your computer.
-A type of malware that installs itself onto devices and steals personal information about the user like usernames and passwords.It tracks every key the user pressed called key logging.
PLZ ANYONE HELP ME ​

Answers

Answer:

       trojan horse

         worm

         virus

        spyware

Explanation:

gimme the brainliest hehe

Answer:

1).Virus :- A type of malware that spreads through normal program.It could simply slow down your device down or cause you to lose all access to programs on your computer.

2).Spyware:- A type of malware that installs itself onto devices and steals personal information about the user like usernames and passwords.It tracks every key the user pressed called key logging.

3).Worm:- This type of malware can copy itself hundreds of times so can hard your device very quickly.

4). Trojan Horse :- This type of malware pretends it will be useful and it is a safe program when it will actually try and attack your device.

Explanation:

Pls give another person brainliest...

thanks hope it helps

A port that allows the transfer of high quality video and audio signals is called a(n) ________ port.

Answers

Answer:

HDMI

Can't you look this up?

Select the correct answer from each drop-down menu.
A multimedia company wants to implement virtualization on machines with no host operating system. Which type of hypervisor should they
use?
The multimedia company should use a(n)
_______ hypervisor. This hypervisor is installed
__________

Answers

Answer:

1. Bare-metal hypervisor

2. top of a physical server

Explanation:

The multimedia company should use a(n) " BARE-METAL" Hypervisor. This hypervisor is installed "top of a physical server"

The bare-Metal hypervisor is often known as the Type 1 hypervisor. It is characterized by good performance and strength.

Also, this type 1 hypervisors is considered to be the operating system on its own.

Hence, in this case, the correct answer to the question is:

1. Bare-metal hypervisor

2. top of a physical server

Answer:

1.)TYPE 1  2.) Directly on the machine. :) I got the answer right!

Explanation:

Hey, anyone like will u jus help meh like pleaseee
Which type of Malware is hard to detect and collects personal data?
1.Spyware
2.Virus
3.Worm
4.Trojan Horse​

Answers

Answer:

1

Explanation:

Answer:

1. Spyware.

Explanation:

Sure... pls give another person brainliest...

love u ❤️

hope it helps

Choose the correct answer

Answers

that is the wrong answer the correct answer is textbox

Text box is the answer

what is the range of values used whe setting velocity?

A. 0% to 100%

B. -100% to 100%

C. 0% to 200%

D. -100% to 200%

Answers

Answer:

A. 0% to 100%

Explanation:

Velocity can be defined as the rate of change in displacement (distance) with time. Velocity is a vector quantity and as such it has both magnitude and direction.

Mathematically, velocity is given by the equation;

[tex] Velocity = \frac{distance}{time} [/tex]

The range of values used when setting velocity is 0% to 100%.

Hence, when working on a virtual reality (VR) robot, you should use a range of 0% to 100% to the set the value of velocity. This range of values are used to denote the rate at which the robot moves i.e its forward and backward motion (movement).

what is a good site to do an educational screen capture tutorial?

Answers

You will need a Application/Software To Screen Capture

I suggest Using OBS

1. Which of the following is true about social media content? D. Once the content is published, it is very difficult to edit or correct it. O C. The tools to create social media content are not easily accessible. B. It can be user-generated and shared by many people. D A It is only created and distributed by the publisher​

Answers

Answer:

B. It can be used-generated and shared by many people.

It can be user-generated and shared by many people, is true about social media content. Thus, option (b) is correct.

What is social media?

Social media is a term used to describe online communication. Social media systems enable users to have discussions, exchange information, and create content for the internet. Social media mostly used in the youth. The social media are to share the information quickly.

Social media re to share the content are the user generated and the share by the many people. The social media are the share the news and the information to the quickly, but sometimes share the information is fake, the audience are the trust. The social media are the opinion to share with everyone. It's the medium of the communication.

Therefore, option (b) is correct.

Learn more about on social media, here:

https://brainly.com/question/24687421

#SPJ2

TRUE OR FALSE - SQL language is used to query data in a Relational Database?

Answers

Answer:

Yes I agree with the other person who answered that

I’m tutoring a kindergartener virtually and have run out of things to do that will keep her engaged. Does anybody have any ideas?

Answers

Maybe cut out some numbers in different colors, he/she might be more engaged!

Answer: Try to just make it fun. Include things they like, love, and or think are funny.

Other Questions
Describe the government of Sudan and the challenges it is currently facing I thought of a number, subtracted it from 6 1/4 , multiplied the difference by 1 2/3 and then by 2 4/5 . The result was the same as the result of division of 146 by 5 3/14 . What was my number? Two point charges, Q1 and Q2, are separated by a distance R. If the magnitudes of both charges are tripled and their separation is also tripled, what happens to the electrical force that each charge exerts on the other one How much space does Riya have left in the room. Give your answer in metres. Equation 1:X-3 = 2-4xWhich of these have the same solution as Equation 1?Explain your reasoning.Equation A:2x-6 = 4-8xEquation B:X-5 = -4xIEquation C2(1-2x) = x-3 Equation D:-3 = 2-5x How do you simplify square roots. Luke plotted the number of hits he got in his baseball games this season versus the number of games played on a scatter plot. He then determined two lines of best fit and looked at the two residual plots shown below to determine which line is a better fit for the data that he collected. Luke wants to use the line of best fit that best fits the data to help him determine how many hits he will get as he plays more games. Determine which statements are true and which are false regarding the line of best fit for the data collected. Select True or False for each statement. if the point (2,-5) is reflected in the line y=x, then the image is what? { this is about reflections btw}a. ( 5,-2) b. (-2,5) c. (-5.2) d. (-5,-2) What is the volume of the triangular prism Hight 10in Base 14 in Length 6 What is the volume of this container I need help with this. Lab: Conservation of Linear MomentumAssignment: Lab Report Urgent!! RiddleImagine your in a round house. With no way to get out. The only thing in the round house is a table and a mirror. How do you get out? Which question is most important to developmental psychology? Simplify -n x 8 x n please help Two suitcases together weigh 84 pounds. One weighs 28 pounds. What is the weight of the other suitcase? Identify the organelle *1 point-Large SubunitSmall SubunitRibosomeO MitochondriaO NucleusO Chloroplast The graph shows the relationship between the number of classes that some university students missed in the scores that those students received on a test based on the graph approximately what test score would you expect for student who misses three classes PLZ HURRYWhy is it important to maintain network relationships, even after you have found a job?a. You never know when you are going to have to find a new job.b. You can return the favor by helping network members with career advice and job leads.c. You will remain informed and connected to people in your field.d. All of the abovePlease select the best answer from the choices provided Describe the process of photosynthesis by including: where it occurs its energy source any energy transformations that occur Convert these denary numbers to binaryIll give Brainly please