After you type data in a cell, the active cell changes, depending on how you enter the data. Please describe what happens if you click the Enter button on the Formula bar, if you press the Enter key, and if you press the Tab key. Also, give an example of when you would use each method of entering data.
What will be an ideal response?
- If you click the Enter button on the Formula Bar, the cell you typed in remains active.
Example (Answers may vary): I want to edit a specific cell, so I pull up the cell's data in the Formula Bar. When I press Enter, the cell I was working in remains active so that I can see that my change was made.
- If you press the Enter key, the cell below the cell you typed in becomes active.
Example (Answers may vary): I am entering a list of numbers in a spreadsheet. I choose to use the Enter key as then it automatically brings me down to the next cell in the column, where I type the next entry.
- If you press the Tab key, the cell to the right of the cell you typed in becomes active.
Example (Answers may vary): I am entering data in a row. I choose to use the Tab key as then it automatically takes me to the cell to the right so I can enter the next item in the row.
You might also like to view...
When a running thread calls________on the synchronization object, every thread in the waiting state for that object becomes ready.
a) wake. b) notifyAll. c) notify. d) None of the above.
The lesson stated that script piracy is just as unethical as picture piracy. If there were degrees of script piracy, what would be an example of a less damaging, more innocent copying of a script? What would be an example of a very damaging, unethical copying of a script? Do you think everyone who copies a script is equally guilty? Why or why not?
What will be an ideal response?
To insert a column, click the column heading to the right of where you want the new one, and then click the Insert button in the ____ group.
A. Styles B. Cells C. Alignment D. Font
Ben wants to provide predictive information about his organization's risk exposure in an automated way as part of an ongoing organizational risk management plan. What should he use to do this?
A. KRIs B. Quantitative risk assessments C. KPIs D. Penetration tests