In Excel“““.allows users to bring together copiesof work-books that otherusers have worked on independently.
(A) Copying
(B) Merging
(C) Pasting
(D) Compiling
(E) None of these

1 Answer

Answer :

Merging

Related questions

Description : The process of copying file to a CD is known as: a) Storing b) Burning c) Pasting d) Copying e) None of These

Last Answer : b) Burning

Description : In social websites like this one, what is your opinion about people divulging your real name or copying & pasting excerpts from chatrooms into forum posts?

Last Answer : I think anyone that knows me well enough to know my name or chat with me would be able to use that info with discreetness. But it might be different for other people. I think we all have our own rules when it comes to that.

Description : condensing output data to exhibit specific information is a. calculating b. recording c. merging d. summarizing

Last Answer : recording

Description : What is the process of copying software programs from secondary storage mediato the hard disk called? (A) Configuration (B) Download (C) Storage (D) Upload (E) Installation

Last Answer : Upload

Description : Name the two South Asian economists who worked together to bring out the initial Human Development Report. -Geography

Last Answer : Dr. Mahbub-ul-Haq and Dr. Amartya Sen.

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

Last Answer : all UDP packets are treated independently by transport layer

Description : In the first books of "Jason Bourne" by Robert Ludlum, is it realistic that the military and the CIA work together in a black ops project just to bring down one single man?

Last Answer : As I remember, Jason Bourne was a made up person. Yes, David Webb was a commando that played the role when a real human was needed. But they attributed pretty much every nifty hit that occurred in the ... Webb (Bourne). Could the CIA and military have cooked up such a thing? I don't see why not.

Description : The default view in Excel is“““.view. (A) Work (B) Auto (C) Normal (D) Roman (E) None of these

Last Answer : Normal

Description : Why does the copy and pasting of a text into a search engine not always work lately?

Last Answer : I have run into this sort of thing before. I don't know if you are facing the same problem. Apparently some sites have sneaky embedded Javascript that somehow prevents a person from correctly ... when pasted was not the one expected. It sounds like you are experiencing a somewhat different problem.

Description : Pasting wet clay ribbons and making patterns on them is known as ____________ work. 

Last Answer : Choose the correct alternative and write the complete sentence: Pasting wet clay ribbons and making patterns ... (c) apply (d) amalgamation

Description : Loose Droppings that stick to the feathers around the vent area in birds is known as? [a] Pasty butt [b] Pasting [c] Paste up [d] Pasted vent [e] All of the above

Last Answer : [e] All of the above

Description : Auditing is based on the assumption that financial data are verifiable. Data are verifiable when two or more qualified individuals, a. Working together, can prove, beyond doubt, the accuracy of ... reach essentially similar conclusions. d. Working together, can agree upon the accuracy of the data

Last Answer : Working independently, each reach essentially similar conclusions

Description : Two non-allelic genes produces the new phenotype when present together but fail to do so independently then it is called (a) epistasis (b) polygene (c) non complementary gene (d) complementary gene.

Last Answer : epistasis

Description : What displays thecontents of the active cell in Excel ? (A) Name box (B) Row Headings (C) Formula bar (D) Task pane (E) None of these

Last Answer : Name box

Description : The basic unit ofa worksheet into which you enter data in Excel is called a– (A) tab (B) cell (C) box (D) range (E) None of these

Last Answer : cell

Description : Is it acceptable for a Jelly to answer questions by cutting and pasting articles from other websites?

Last Answer : No, you should report these. Answers are supposed to be credited if taken from somewhere else.

Description : How can I prevent accidental pasting in bash?

Last Answer : bash is old enough that I doubt anyone has put something like that in. Might be something better implemented in the terminal-- are you using a local tty or some sort of remote terminal app?

Description : Whats a lightwieght program for copy-pasting pictures?

Last Answer : Copy-Pasting? I'm kinda lost as to what you mean. Anyway, try Paint.Net if you are on Windows. http://www.getpaint.net/ , or http://picasa.google.com/ .

Description : The use of spooler programs and/or “. Hardware allows personal computer operators to do the processing work at the same time a printing operation is in progress a. Registered mails b. Memory c. CPU d. Buffer

Last Answer : Buffer

Description : What the historical method of compiling a dictionary was first used by Dr. Samuel Johnson. True?

Last Answer : Need answer

Description : _____is the process of finding errors in software code. 1) Compiling 2) Testing 3) Running 4) Debugging 6 5) None of these

Last Answer : Answer :4

Description : Which of the following is the process of assembling program  components, data, and libraries, and then compiling and linking these to  create an executable system? a) System building b) Release management c) Change management d) Version management

Last Answer : a) System building

Description : High level language C supports register transfer technique for _ application. a. Executing b. Compiling c. Both d. None

Last Answer : a. Executing

Description : What is correcting errors in a program called? 1) Debugging 2) Compiling 3) Interpreting 4) None of these

Last Answer : 1) Debugging

Description : Compiling creates a(n)- 1) Program Specification 2) Algorithm 3) Executable Program 4) Subroutine

Last Answer : 3) Executable Program

Description : The Process of writing out computer instructions is known as- 1) Assembling 2) Compiling 3) Executing 4) coding

Last Answer : 1) Assembling

Description : ..... is the process finding errors in software code. 1) compiling 2) Assembling 3) Interpreting 4) Debugging

Last Answer : 4) Debugging

Description : The process of combining strings is known as (1) compiling (2) Combining (3) Attaching (4) Concatenation

Last Answer : Concatenation

Description : In programming, repeating some statements is usually called (1) Compiling (2) Structure (3) Looping (4) Control structure

Last Answer : Looping

Description : What is the name of the softwarepackage that allows peopleto sendelectronic mail along anetworkof computers and workstations? A. Memory residentpackage B. Project management package C. Data communication package D. Electronic mail package E. None of the above

Last Answer : Data communication package

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Which one of the following statements is NOT correct about HTTP cookies? a. A cookies is a piece of code that has the potential to compromise the security of an Internet user b. A cookie gains entry ... and time d. Cookies can be used to track the browsing pattern of a user at a particular site

Last Answer : a. A cookies is a piece of code that has the potential to compromise the security of an Internet user

Description : You are designing a network which needs to support 200 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? Select the best answer. A. 255.255.0.0 B. 255.255.255.0 C. 255.0.0.0 D. 255.224.0.0 E. 255.255.255.200

Last Answer : 255.255.255.0

Description : Which of the following does not allow multiple users or devices toshare onecommunications line? A. doubleplexer B. multipplexer C. concentrator D. controller E. None of the above

Last Answer : doubleplexer

Description : How do I leave certain cells in an Excel spreedsheet unlocked so that other users can modify them?

Last Answer : I wonder if the fact that the cells I’m trying to leave unlocked are merged is part of what is creating this problem…?

Description : Which of the following memories allows simultaneous read and write operations? a. ROM b. RAM c. EPROM d. None of above

Last Answer : RAM

Description : What type of network device allows youto share your connection to the Internet with other computers in your home? A) Ethernet card B) NIC C) Router D) Cat 5

Last Answer : Router

Description : In _________, autonegotiation allows two devices to negotiate the mode or datarate of operation. A) Standard B) Fast Ethernet C) Gigabit Ethernet D) Ten-Gigabit Ethernet

Last Answer : Fast Ethernet

Description : A _______LAN allows several LANs to be connected. A) backbone B) wireless C) wired D) none of the above

Last Answer : backbone

Description : _____ isa digitalprocess that allows several connections to share thehighbandwidth ofa link. A) FDM B) TDM C) WDM D) None of the above

Last Answer : TDM

Description : ________is the set of techniques that allows the simultaneous transmission of multiple signalsacrossa single data link. A) Demodulating B) Multiplexing C) Compressing D) None of the above

Last Answer : Multiplexing

Description : The Federal Communications Commission (FCC) allows ______ kHz for each FM station. A) 20 B) 100 C) 200 D) none of the above

Last Answer : 100

Description : The Federal Communications Commission (FCC) allows ______kHz for each AM station. A) 5 B) 10 C) 20 D) none of the above

Last Answer : 0

Description : IPv6 allows _________ security provisions than IPv4. A) more B) less C) thesame level D) noneof the above

Last Answer : more

Description : The _______ protocol allows the administrator toassign acost, called the metric, to each route. A) OSPF B) RIP C) BGP D) none of the above

Last Answer : OSPF

Description : What type of telecommunicationshardware allows you to access the web? A) Browser B) Modem C) FTP protocol D) IRC

Last Answer : Modem