Match the column.
Description Shortcut key
Move to next cell in row page up

Answers

Answer 1

The matchup are:

1) move to next cell in row - tab

2) move to previous cell in row - shift+tab

3) up one screen - page up

4) down one screen - page down

5) move to next worksheet - ctrl + page down

6) move to previous worksheet - ctrl + page up

7) go to first cell in data region - ctrl+ home

8) go to last cell in data region - ctrl + end

What are computer shortcut keys?

A computer shortcut is known to be some group of one or a lot of keys that brings about a command in software or in any kind of operating system.

Hence, The matchup are:

1) move to next cell in row - tab

2) move to previous cell in row - shift+tab

3) up one screen - page up

4) down one screen - page down

5) move to next worksheet - ctrl + page down

6) move to previous worksheet - ctrl + page up

7) go to first cell in data region - ctrl+ home

8) go to last cell in data region - ctrl + end

Learn more about computer shortcut from

https://brainly.com/question/12531147

#SPJ1

Match The Column.Description Shortcut KeyMove To Next Cell In Row Page Up

Related Questions

What are the three places that store personal data

Answers

Answer: information in databases, Internet bulletin boards, newsgroups, and social media sites.

Explanation:

The _____ method of developing systems produces code that is modular and reusable.

Answers

The object-oriented analysis method of developing systems produces code that is modular and reusable.

What is object oriented system analysis?

Object-oriented systems analysis and specification (OSA) is known to be a kind of a method that is often used in regards to systems analysis and this is known to be one that helps to create or builds on the strengths of former systems and, at also at the same time, look into their weaknesses.

Note that this is said to be the basic idea behind the OSA methodology that are known to be described. The framework of OSA system models is known to be object class.

Hence, The object-oriented analysis method of developing systems produces code that is modular and reusable.

Learn more about object-oriented  tool from

https://brainly.com/question/11158544

#SPJ1

Kate needs to insert 10 text boxes in a document. after inserting the first text box, how can she easily repeat the action nine more times?

Answers

Kate can easily repeat the action nine more times if she press the Redo button nine times.

What is the button about?

The button for redo is one that states that that action should be done again.

Note that for a person to redo something that they have undone, one can press Ctrl+Y or F4 and thus

Hence, Kate can easily repeat the action nine more times if she press the Redo button nine times.

See full question below

Kate needs to insert 10 text boxes in a document. After inserting the first text box, how can she easily repeat the action nine more times?

a. Press the Redo button nine times.

b. Right-click the text box border and select Repeat nine times.

c. Press CTRL+R nine times.

d. Cut the text box and then paste it.

Learn more about Redo button from

https://brainly.com/question/10383258

#SPJ1

One common command-line network utility tool is “netstat,” which displays which protocol is being used. It can review particular ports or display all active connections and ports on which a computer is listening and, depending on the OS, can also include the total number of bytes of traffic, domain names, and IP addresses (local and foreign). Name at least two potential uses of this command, making sure at least one use is related to secure administration principles.

Answers

An example of two potential uses of this command is in the area or aspect of:

The troubleshoot of networking problems.In configuration

What protocol does the netstat command use?

It is known to use the Internet Protocol (TCP/IP) and it is one that is used without parameters, this command  is said to often show active TCP connections.

What is netstat used for?

The network statistics ( netstat ) command is known to be a kind of a networking tool that is often used for troubleshooting and configuration, and this is one that can be used as a tool for monitoring for connections over the network.

Hence,  it is used in incoming and outgoing connections, routing tables, port listening, and others. Therefore, An example of two potential uses of this command is in the area or aspect of:

The troubleshoot of networking problems.In configuration

Learn more about troubleshoot from

https://brainly.com/question/9572941

#SPJ1

2. Change the owner of /home/fparker/projects to the fparker user and change the group to the fparker group

Answers

The program based on the information given is illustrated below.

What is a program?

It should be noted that a computer program is a set of instructions in a programming language for a computer to execute. In this case, computer programs are one component of software.

Basedon the information given, in order to change the owner and group that owns the directory projects from the linux terminal, the command will be:

chown fparker:fparker /home/fparker/projects

chown is the command that is used to change the owner and group of any file or directory in linux.

fparker:fparker - is in the format user:group that is, the ones that need to be changed), since user name and the group name are fparker, it is used.

/home/fparker/projects - is the path of the directory, where the owner and group are being changed.

Learn more about program on:

https://brainly.com/question/23275071

#SPJ1

Complete information

Complete the following tasks in order on CorpServer:

Change the owner of /home/fparker/projects to the fparker user and change the group to the fparker group.

Resource _____ let you view, manage, and automate tasks on multiple aws resources at a time.

Answers

Resource group let you view, manage, and automate tasks on multiple aws resources at a time.

What are the resource groups?

Resource groups is known to be a kind of a group that is said to be the key unit in System Automation that is meant for Multiplatforms.

Note that it is said to be logical containers that are meant for the collection of resources hence, Resource group let you view, manage, and automate tasks on multiple aws resources at a time.

See full question below

Resource _____ let you view, manage, and automate tasks on multiple AWS resources at a time.

A-stores.

B-groups.

C-users.

D-graphs.

Learn more about Resource group from

https://brainly.com/question/3752408

#SPJ1

How to get flash to work on chrome?

Answers

Answer:

Open Chrome on your computer. If you’re using Windows, you’ll usually find it in the Start menu.

Click the ⁝ menu.

Click Settings.

Scroll down and click Advanced.

Scroll down and click Content settings.

Explanation:

Define a function Convert Volume() that takes one integer parameter as total Tablespoons and two integer parameters passed by reference as cups and tablespoons. Of total Tablespoons is negative, the function returns false without updating the parameters. Otherwise, the function converts total Tablespoons to cups and tablespoons, and then returns true.

Answers

Using the computational language in C++ it is possible to write a code that converts total Tablespoons to cups and tablespoons.

Writting the code in C++:

#include<iostream>

using namespace std;

void ConvertVolume(int totalTablespoons, int &cups, int &tablespoons) {

   // compute the cups and tablespoons

   // as they are passed by reference,

   // the change will also reflect in the main function

   cups = totalTablespoons / 16;

   tablespoons = totalTablespoons % 16;

}

int main() {

   int usrCups;

   int usrTablespoons;

   int totalTablespoons;

   

   // user input

   cin>>totalTablespoons;

   

   // call the function

   ConvertVolume(totalTablespoons, usrCups, usrTablespoons);

   

   // print the output

   cout<<usrCups<<" cups and "<<usrTablespoons<<" tablespoons"<<endl;

   

   return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

46. The public information _______________ includes the types of information to be distributed, the procedures for distributing information, procedures for updating or correcting information, and a method for allowing the public to express concerns or questions.

Answers

Answer:

the public information cycle or system

Task 5: Create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer whose ID currently is stored in I_CUST_ID. Place these values in the variables I_CUSTOMER_NAME and I_CREDIT_LIMIT, respectively. When the procedure is called it should output the contents of I_CUSTOMER_NAME and I_CREDIT_LIMIT.

Answers

The SQL statement that would create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer is:

GET_CREDIT_LIMIT

SELECT CUST_ID 125

FROM FIRST_NAME, LAST_NAME, CREDIT_LIMIT

WHERE LAST_NAME ="Smith"

What is SQL?

This is an acronym that means Structured Query Language that is used in handling data in a database.

Hence, we can see that from the attached image, there is a table that contains the details of customers and their various data such as their first and last names, credit limits, address, etc, and the  GET_CREDIT_LIMIT procedure is shown above.

Read more about SQL here:

brainly.com/question/25694408

#SPJ1

Is not recognized as an internal or external command, operable program or batch file.

Answers

Python  Is not recognized as an internal or external command, operable program or batch file.

Which is not recognized as an internal or external?

The “Python is known to be a program that is not seen as or is one that is not recognized as what we call an internal or external command”

Note that an error is said to be often encountered in the command prompt of the  Windows. The error is said to be an outcome that is due to when Python's executable file is said to  not found in the environment variable.

Therefore, Python  Is not recognized as an internal or external command, operable program or batch file.

Learn more about  operable program from

https://brainly.com/question/25327617

#SPJ1

A type of expansion card that enables communication over cellular network is referred to as:______.

Answers

A type of expansion card that enables communication over cellular network is referred to as a WWAN card.

What are the type of expansion card?

The Network Interface Card (NIC) is known to be a kind of a card that gives room for computers to  be able to communicate over a given computer network, and it is one that is either by using cables or wireless.

The WWAN card is known to be the Wireless Wide Area Network (WWAN) and this is known to be a kind of a wireless network that links one to the Internet via the use of cellular technology.

Hence, in the case above, A type of expansion card that enables communication over cellular network is referred to as a WWAN card and thus it is correct.

Learn more about expansion card from

https://brainly.com/question/13050587

#SPJ1

Relational operators allow you to ________ numbers

Answers

Relational operators allow an end user to compare numbers.

What are relational operators?

Relational operators can be defined as a programming language construct which allows an end user to compare both numbers and char values.

Also, it can be used to determine whether one number is less than (<), greater than (>), equal to (=), or not equal to another.

This ultimately implies that, relational operators allow an end user to compare numbers.

Read more on relational operators here: https://brainly.com/question/14995818

#SPJ1

Determine whether the compound condition is True or False.
7<12 or 50!=10

7<12 and 50<50

not (8==3)

Answers

The  compound condition are:

7<12 or 50!=10 is false7<12 and 50<50 is falsenot (8==3) is true

What is compound condition?

A compound statement is known to be one that shows up as the body of another statement, e.g. as in if statement.

The  compound condition are:

7<12 or 50!=10 is false7<12 and 50<50 is falsenot (8==3) is true

Learn more about compound condition  from

https://brainly.com/question/18450679

#SPJ1

A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement

Answers

Using an extranet
You will give the group a username and a password that each of them would use to enter your network

I don’t think this is it but I hope this gave you an understanding <3

You cannot view the presentation by clicking the slideshow icon on the status bar

Answers

The Statement is false,

Explination: You can view your slides in a variety of ways depending on the task at hand.

Which colour scheme and design elements would you choose for a website for a neighbourhood swim team

Answers

F this is not related to math I’d pick light blue or a teal blue with either white or gold

Which of the cached information retrieved will be the same as what is stored in the original server where the data is maintained

Answers

The answer is Yes, A browser cache is known to be a type of client-side cache, and it implies that it is also a type of site caching.

What is cache on a browser?

The browser cache is known to be a kind of 'cache' tool that is often used by a person's internet browser so that one can fasten up the page loading act.

Hence, The answer is Yes, A browser cache is known to be a type of client-side cache, and it implies that it is also a type of site caching.

Learn more about browser cache from

https://brainly.com/question/14598358

#SPJ1

An Amazon Fulfillment Associate has a set of items that need to be packed into two boxes. Given an integer array of the item weights (

Answers

The task here is to complete a function that gives the required result indicated in the question. [See the full question below]

What is the completed function of for the above program?

The completed function is given as;

def minimulHeaviestSetA(arr,n):

    arr.sort(reverse=True)

    x=0

    for i in range(1,n):

        if sum(arr[:i])>sum(arr[i:]):

            x=i

           break

    return arr[:x][::-1]

              n=int(input()) arr=list(map(int,input().split())) A=minimulHeaviestSetA(arr,n)

print(A)  

Learn more about functions:
https://brainly.com/question/20476366
#SPJ1

Full question:

An Amazon Fulfillment Associate has a set of items that need to be packed into two boxes. Given an integer array of the item weights larr) to be packed, divide the item weights into two subsets, A and B. for packing into the associated boxes, while respecting the following conditions: The intersection of A and B is null The union A and B is equal to the original array.

The number of elements in subset A is minimal. The sum of A's weights is greater than the sum of B's weights. Return the subset A in increasing order where the sum of A's weights is greater than the sum of B's weights. If more than one subset A exists, return the one with the maximal total weight.

Example n=5 arr = 13,7,5,6, 2) The 2 subsets in arr that satisfy the conditions for Aare (5, 7) and (6, 7]:

A is minimal (size 2) • Surn(A) = (5 + 7) = 12 > Sum(B) = (2+ 3+6) = 11 • Sum(A) + (6 + 7) = 13 > Sum(B) = (2 + 3 + 5) - 10 •

The intersection of A and B is null and their union is equal to arr. . The subset A where the sum of its weight is maximal is [6.7).

Function Description Complete the minimal Heaviest Seta function.

A client discovers the address of a domain controller by making a dns query for which record?

Answers

In order for a client to discover the address of a domain controller, they can make a DNS query for the SRV record.

What is the SRV record?

This refers to a record of the location of data files in a certain service being offered in a system. It is considered a Domain Name System (DNS) record which means it can be access via a DNS query.

If a client wants to discover the location of a domain controller, they can use this Domain Name System to make a query that will help them to locate the address of the domain controller from the records in the Active Directory.

Find out more on the Domain Name System (DNS) at https://brainly.com/question/12465146

#SPJ1

The Crow’s foot symbol with two vertical parallel lines indicates _____ cardinality.a. (0,N)b. (1,N)c. (1,1)d. (0,1)

Answers

The Crow’s foot symbol with two vertical parallel lines indicates option  c. (1,1) cardinality.

What is Symbols in crow's foot notation?

Crow's foot diagrams is one that stands for entities as boxes, and its association as lines that exist between the boxes.

Note that different shapes at the ends of these lines stands for the relative cardinality of the relationship and thus The Crow’s foot symbol with two vertical parallel lines indicates option  c. (1,1) cardinality.

Learn more about notation from

https://brainly.com/question/1750038

#SPJ1

Which option can be used to import selected slides form a previously created presentation into a new presentation without manually copying and pasting them?

Answers

An option which can be used to import selected slides form a previously created and existing presentation into a newly created presentation without having to manually copy and paste them is reuse slide.

What is a presentation application?

A presentation application can be defined as a type of computer application which is designed and developed to avail its end users an ability to create various slides that contains both textual and multimedia information, which are typically used during a presentation.

What is a slide?

A slide can be defined as a single page of a presentation that contains text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic.

In Computer technology, reuse slide is an option which can be used to import selected slides form a previously created and existing presentation into a newly created presentation without having to manually copy and paste them.

Read more on slides here: brainly.com/question/11741377

#SPJ1

to verify that the ip address sorting criteria that has not been configured to overlap between different groups you can use the

Answers

For one to be able to verify that the ip address sorting criteria that has not been configured to overlap between different groups you can use the check IP group - testing.

What does IP group do?

The term IP Group is known to be one that looks at or is one whose purpose is so that it can  generate  a lot of a positive social and also that of environmental impact with financial returns.

Note that this is one that offers shareholders a kind of an exposure to a a lot of portfolio of opportunities that is made up of a  high-growth businesses in regards to the growth markets.

Hence, For one to be able to verify that the ip address sorting criteria that has not been configured to overlap between different groups you can use the check IP group - testing.

Learn more about IP address from

https://brainly.com/question/24930846

#SPJ1

When using sftp to share files, what is encrypted in addition to the authentification information?.

Answers

In addition to the authentification information, the data files are encrypted when using SFTP to share files.

What is SFTP?

SFTP is an abbreviation for SSH File Transfer Protocol and it can be defined as a type of secured file transfer protocol that's designed and developed to run over the SSH protocol by supporting full security and authentication, file management, as well as sharing files between two or more users on an active computer network.

This ultimately implies that, SSH File Transfer Protocol can be used for file management, file transfer and provide end users with full security and authenticated file access.

In conclusion, we can infer and logically deduce that in addition to the authentification information, the data files are encrypted when using SSH File Transfer Protocol (SFTP) to share files.

Read more on file transfer here: brainly.com/question/20602197

#SPJ1

A(n) ___________ g is a set of elements with a binary operation, denoted by *, that associates to each ordered pair (a,b) of elements in g an element ( a*b) in g.

Answers

A(n) elliptic curve is a set of elements with a binary operation, denoted by *, that associates to each ordered pair (a,b) of elements in g an element ( a*b) in g.

Why is it called an elliptic curve?

In mathematics, an elliptic curve is known to be a kind of a smooth, curve that is said to be projective and also an algebraic curve which there is found to be a specified point O.

Note that  the elliptic curves are seen to be the set of points that are said to be gotten or obtained as an outcome of solving elliptic functions that is known to be over a predefined space.

Therefore, A(n) elliptic curve is a set of elements with a binary operation, denoted by *, that associates to each ordered pair (a,b) of elements in g an element ( a*b) in g.

Learn more about binary operation from

https://brainly.com/question/26891746

#SPJ1

A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are: 1) The year must be divisible by 4 2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400 Some example leap years are 1600, 1712, and 2016. Write a program that takes in a year and determines whether that year is a leap year. Ex: If the input is:
1712 the output is: 1712 is a leap year. Ex: If the input is: 1913 the output is: 1913 is not a leap year
Your program must define and call the following function. The function should return true if the input year is a leap year and false otherwise. def is_leap_year(user_year) Note: This is a lab from a previous chapter that now requires the use of a function,

Answers

Based on the fact that the program should be able to return true if the input is a leap year, and false if the input is not, the program is shown below.

What program will return true if it is a leap year?

In order to make a program that tells whether a year is a leap year or not, you need to start off with the definition:

def is_leap_year(user year):

Then continuing the program, the full code would be:

def is_leap_year(user_year):

   if(user_year % 400 == 0):

       return True

   elif user_year % 100 == 0:

       return False

   elif user_year%4 == 0:

       return True

   else:

       return False

if __name__ == '__main__':

   user_year = int(input())

   if is_leap_year(user_year):

       print(user_year, "is a leap year.")

   else:

       print(user_year, "is not a leap year.")

If you input the year, 1712, the program would return the result, "1712 is a leap year."

Find out more on using programs to define functions at https://brainly.com/question/20476366

#SPJ1

A framework for studying memory that uses the computer as a model of human cognitive processes defines the?

Answers

A framework for studying memory that uses the computer as a model of human cognitive processes defines the information processing theory

What is information processing theory?

The information processing theory explains how human bras also works like a computer by converting various thought, observation to meaningful information.

The human brain is said to works in a sequential way. It receives input such as picture and processes the information to give a result.

Therefore, A framework for studying memory that uses the computer as a model of human cognitive processes defines the information processing theory

Learn more on information processing  below

https://brainly.com/question/11610994

#SPJ1

what is non verbal communication ?​

Answers

Answer:

Nonverbal communication is the transfer of information through body language, facial expressions, gestures, created space and more.

Explanation:

For example, smiling when you meet someone conveys friendliness, acceptance and openness. Everyone uses nonverbal communication all the time whether they know it or not.

Answer:

Non verbal communication is any communication that doesn't involve words. Instead, it involves body language, such as eye contact, nodding, etc.

Brainliest, please :)

Write an expression whose value is true if all the letters in the str associated with s are all lower case

Answers

An expression whose value is true if all the letters in the str associated with s are all lower case is  s.islower()

What does expression implies in computer terms?

The term "expression" is a term that connote a computer program statement that examines to some specific value.

Note that A Boolean expression can examine to either true or false, e.g. ( money > 100 ).

Hence, An expression whose value is true if all the letters in the str associated with s are all lower case is  s.islower()

Learn more about Computer expression from

https://brainly.com/question/24912812

#SPJ1

The formula for steady-state consumption per worker (c*) as a function of output per worker and investment per worker is:_________

Answers

Answer:

C= f(k) - dk*

The formula for steady-state consumption per worker (c*) as a function of output per worker and investment per worker is: c= f(k) - dk*. When an economy begins above the Golden Rule, reaching the Golden Rule: produces higher consumption at all times in the future.

Other Questions
1: Describe in 150 words the difference between energy demand and energy consumption.2: Pick 3 energy efficiency topics (lighting, air compressors, electric motors, HVAC, boilers) and identify and describe a strategy not discussed this semester. Include 1) How the strategy works (3-4 sentences), 2) A typical instance of where the strategy could be applied (1-2 sentences), 3) Things to consider if application identified is appropriate (1-2 sentences). explain the major difference between statistical and nonstatistical sampling. are both methods acceptable according to auditing standards? m What If? The 21.1 cm line, corresponding to emissions from hyperfine transitions in hydrogen, plays an important role in radio astronomy. m (c) What would be the angular resolution (in degrees) of the telescope receiving dish from part (a) for the 21.1 cm line? Let V be a vector space and y, z, , EV such that 2 = 2x + 3y, w=2 - 2x + 2y, and v=-=+22 2) Determine a relationship between Span(x,y) and Span(w, u). Are they equal, is one contained in the other? If neither are true state that with evidence. b) Determine a relationship between Span(y) and Span(:,c). Are they equal, is one contained in the other? If neither are true state that with evidence. c) Determine a relationship between Span(, n) and Span(y). Are they equal, is one contained in the other? If neither are true state that with evidence. Consider an adiabatic and reversible process for air, starting at 1000 kPa and 1900 Kand ending at 363.7 kPa. Determine the final temperature in units of K. Do not include units. Type your numeric answer and submit Consider an adiabatic compressor operating at steady-state. Superheated water vapor enters the compressor 350 Celsius and 1 MPa. Superheated water vapor leaves the compressor at 900 Celsius and 8 MPa. The mass flow rate is 16 kg/s. Ignoring potential and kinetic effects, assess the turbine power in MW. Report your answer using three significant digits. Do not round numbers used in computations Type your numeric answer and submit deserialization is the process of converting an object into a data format, something like xml or json, with the intent of putting it back together later. true or false? what number of moles of h2 will be produced when 4.0 mol na is added to 1.2 mol h2o? FILL IN THE BLANK american youth who frequently go to violent websites were _____ likely to report engaging in violent behavior. 3. since the function and presence of actin and myosin is identical in all muscle cells, how can smooth muscle cells contract if there are no striations Which of the following are features of Hyracotherium, the earliest known members of the horse family, as revealed by the fossil record?A.) broad feet B.) narrow feetC.) long legsD.) large body sizeE.) small body size F.) short legs find parametric equations for the line segment from (9, 2, 1) to (6, 4, 3). (use the parameter t.) (x(t), y(t), z(t)) = A sample of a diatomic ideal gas occupies 33.6 L under standard conditions. How many mol of gas are in the sample?a) 3b) .75c) 3.25d) 1.5 Forensic linguistics encompasses civil cases, criminal cases, cyberterrorism cases, and other legal proceedings. True/FALSE The poet uses figurative language in lines 17-18 mostly to describeThe males perked their armor, greased their wings;And flew sky-loop missionsA. the male cardinals preparing to fight to the death to win her yeB. the male cardinals preening and showing off to compete for her loveC. the male cardinals preparing for a mission to find a femaleD. the male cardinals' recklessness in flight which header will be the smallest?responseshellohellohellohellohellohellohellohello You are considering purchasing a call option with a strike price of $35. The price of the underlying stock is currently $27. Without any further information, you would expect the delta for this option to be _______________. A. negative and near 0 B. negative and near -1 C. positive and near 0 D. positive and near 1 the instrument used to guarantee service performance between a government entity, a, using the service, and government entity b, providing the service, is most likely a: which of the following types of media might be particularly helpful in the isolation of a bacterial species from a mixed bacterial culture? Explain wheelans argument that good government makes the market economy possible? The rationale for avoiding the pooled two-sample t procedures for inference is thatA) testing for the equality of variances is an unreliable procedure that is not robust to violations of its requirements.B) the "unequal variances procedure" is valid regardless of whether or not the two variances are actually unequal.C) the "unequal variances procedure" is almost always more accurate than the pooled procedure.D) All of the above