Janice usually works on a particular workbook. She decides to keep a backup of all the data in a separate workbook. She opens a new workbook to transfer the data. Which option should she use to copy all the data from one workbook to another workbook?A. press the Ctrl and V keys on the keyboard
B. press the Ctrl and C keys on the keyboard
C. press the Ctrl and A keys on the keyboard
D. press the Ctrl and Z keys on the keyboard

Answers

Answer 1
Answer:

The answer is B: press the Ctrl and C keys on the keyboard

The Ctrl and C key is the standard combination keys on the keyboard that is used to copy any selected text or objects while in a user interface environment. Janice is required to press the C key while holding down the Ctrl key to copy all the content to the new workbook.

Answer 2
Answer: she would use Ctrl and C bc thats the copy short cut

Ctrl and v is pasting
Ctrl and a is selecting all text and 
Ctrl and z is for cutting the text

Related Questions

Explain the nature of documents that can be suitable for merging
Name five services available at banks.
A personal computer uses a number of chips mounted on a circuit board calleda. microprocessor b. system board c. daughter board d. mother board
​A(n) ____ includes hardware, software, inputs, outputs, data, people, and procedures.
To close the ____ view, click File on the Ribbon or click the preview of the document in the Info gallery to return to the document window. a. Outline b. Backstage c. Web Layout d.Both a and b

To what do buses and lines connect in a computer chip?

Answers

Address and data buses, which send addresses and data to memory, and read and write lines, which tell the memory whether it wants to set or get an addressed location, can connect to either ROM or RAM and generally connects to both.

Final answer:

Buses and lines on a computer chip connect to transistors, creating intricate electric circuits. These circuits, made possible by silicon-based integrated circuits, handle the binary code used in modern computing and operate on a nanoscopic scale.

Explanation:

In a computer chip, buses and lines connect to transistors, creating an intricate electric circuit. Transistors, behaving like on-off switches, handle digital signals that represent binary code; a transistor is either on or off. Integrated circuits, made from silicon or other semiconductors, contain vast collections of transistors, allowing for massive and complex data manipulation.

Silicon-based integrated circuits have revolutionized computer technology by integrating transistors and capacitors in a space-efficient manner, enabling the creation of densely packed circuitry required for modern computing devices like computers and cell phones. Such devices contain electric circuits with features as small as a nanometer.

These transistors are interconnected through buses and lines, known as the electrical pathways. These pathways are created using ultraprecise chemical treatments of the silicon or other semiconductors, which provides the precision needed for the minuscule scale of circuitry.

Learn more about Computer Chip here:

brainly.com/question/26164153

#SPJ11

You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19), Protecting Whistleblowers with Access to Classified Information.A. TrueB. False

Answers

Answer:

A. True.

Explanation:

If you are a cleared employee, who discovered fraud and waste of money related to a classified program within your agency. When you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19): Protecting Whistleblowers with Access to Classified Information.

In the United States of America, President Barack Obama signed the Presidential Policy Directive 19 (PPD-19) in 2012. The PPD-19 is an executive order designed to provide significant protection for an employee who have access to classified informations such as waste of money and frauds, as well as prohibiting any form of retaliation against this cleared employee.

Device used for setting one story inside another a) dramatic monologue b) fabliau c) parable d) frame narrative

Answers

Answer:

d) frame narrative

Explanation:

Final answer:

A frame narrative is the literary device used for setting one story inside another, providing a broader context to the main story. It allows for different points of view, times, and places to be combined in a single narrative as seen in Mary Shelley's 'Frankenstein'.

Explanation:

In literature, the device used for setting one story inside another is the frame narrative. A frame narrative, or frame story, introduces the main plot and often sets the stage for the embedded story. This can be a useful tool for authors to provide a broader perspective or context for the main narrative.

For instance, in Mary Shelley's 'Frankenstein,' the frame narrative is presented through Captain Walton’s letters to his sister. Within his story, Victor Frankenstein tells his story, which in turn includes the creature's story. Through the use of the frame narrative, Shelley combines different points of view, times, and places to ultimately create a more intricate and rich narrative.

While the other options, such as dramatic monologue, fabliau, and parable are literary devices, they are not designed specifically for nesting one story within another as a frame narrative does.

Learn more about frame narrative here:

brainly.com/question/6506716

#SPJ11

Write a SELECT statement that returns three columns: EmailAddress, OrderID, and the order total for each customer. To do this, you can group the result set by the EmailAddress and OrderID columns. In addition, you must calculate the order total from the columns in the OrderItems table.Write a second SELECT statement that uses the first SELECT statement in its FROM clause. The main query should return two columns: the customer’s email address and the largest order for that customer. To do this, you can group the result set by the EmailAddress column.

Answers

Answer:

Select EmailAddress,max(total) from (Select EmailAddress, OrderID, sum(total) as total from OrderItems group by EmailAddress, OrderID) group by EmailAddress

Explanation:

First step is group the rows by email and order id and sum de total of orders

Select EmailAddress, OrderID, sum(total) as total from OrderItems group by EmailAddress, OrderID

Then you use the above query as a subquery grouping by the email and selecting the max value by client

Select EmailAddress,max(total) from (Select EmailAddress, OrderID, sum(total) as total from OrderItems group by EmailAddress, OrderID) group by EmailAddress

__________ programming is a form of design intended to ensure the continuing function of a piece of software in spite of unforeseeable usage of the software.

Answers

Defensive programming

Final answer:

Resilient Software Design is the technique of designing software to maintain function despite unanticipated usage situations or errors. It includes mechanisms for recognizing, isolating, and addressing failures.

Explanation:

The type of programming referred to in the question is Resilient Software Design. This design methodology focuses on developing software that can maintain its function even when unforeseen circumstances or exceptional conditions occur during its usage. Resilient software is programmed to adapt, recover and continue functioning despite any anomalies or errors, thus ensuring stable and continuous operation. For instance, if certain parts of the system fail, the software should be able to identify the issue, isolate the faulty components, and reconfigure itself to continue operating with minimal disruption.

Learn more about Resilient Software Design here:

brainly.com/question/32592557

#SPJ11

Which country have the most population

Answers

I think it’s china or india