Which UPPER function is written so that all text in cell B4 will be capitalized? O=UPPER(B4) O=UPPER[B4] O UPPER B4 O=UPPER

Answers

Answer 1
The Excel UPPER function converts a text string to all uppercase letters. Numbers, punctuation, and spaces are not affected.

So , Which upper function is written so that all text in cell b4 will be capitalized

Answer is : PROPER function

Related Questions

PLEASE HELP!!! NO LINKS PLEASE!!!! 50 POINTS!!!!!

Select any theater production that is in the public domain and that has also been made into a film, such as Romeo and Juliet. Search for the film script and the play script online. Write a few paragraphs comparing the film and live production, and write about the genre of the production. Then, compare the scripts of the theater production and the film, and write about the differences and similarities that you find. You can find film scripts and drama scripts at websites such as Simply Scripts:

Answers

Answer:

ang hirap naman plss answee

what is the full form of BASIC​

Answers

Answer:

BASIC, in fullBeginner's All-purpose Symbolic Instruction Code, computer programming language developed by John G.

Complete a flowchart and a Python program to calculate grade of a student based on marks using the following criteria:

Ask a student for their marks and if their marks are:

More than 90 – print “A*”

Between 80 and 90 – print “A”

Between 70 and 80 – print “B”

Between 60 and 70 – print “C”

Between 50 and 60 – print “D”

Between 40 and 50 – print “E”

Under 40 – print “Fail”

Answers

Answer:

grade = int(input("Enter grade: ")

if grade > 90:

   print("A*")

elif grade > 80 and grade < 90:

   print("A")

elif grade > 70 and grade < 80:

   print("B")

elif grade > 60 and grade < 70:

   print("C")

elif grade > 40 and grade < 50:

   print("E")

else:

   print("Fail")

Explanation:

in reference to operating systems, what is spooling? what does it stand for? chegg

Answers

Answer:

Spooling is a process in which data is temporarily held to be used and executed by a device, program or the system. Data is sent to and stored in memory or other volatile storage until the program or computer requests it for execution. "Spool" is technically an acronym for simultaneous peripheral operations online.

algorithm to find the difference between two numbers second number is greater than first
Plzzz solve this problem ​

Answers

Answer:

You should concentrate yourself

Explanation:

1=x

2=y

x<y

hence proved solved thank me later

differentiate between program virus and boot sector virus

Answers

Answer:

The virus replaces the default program with its own corrupted version. A boot sector virus is able to infect a computer only if the virus is used to boot up the computer. The computer will not be infected if the virus is introduced after the boot-up process or when the computer is running the OS

Explanation:

please mark me brainlisted answer please

Explanation:

i don't know this but i just need the points

what hash format are modern windows login passwords stored in?

Answers

User passwords are hashed and stored in a registry hive as either an LM hash or an NTLM hash. This file requires System privileges to view.

What are the windows?

Microsoft created Windows as an operating system. The operating system is responsible for allowing to use a computer. Windows comes preloaded on the majority of new personal computers (PCs), which contributes to its status as the world's most popular operating system.

A window is a distinct viewing area on a computer display screen that is part of a system that allows multiple viewing areas as part of a graphical user interface (GUI). As part of a windowing system, windows are managed by a windows' manager.

Therefore, user passwords are hashed and stored as either an LM hash or an NTLM hash in a registry hive.  

Learn more about the windows, refer to:

https://brainly.com/question/13502522

#SPJ5

How can I master networking my home/business computer(s) - Tv's - iot devices and make the whole system as secure as possible?

Answers

Answer:

you can take guide from

hope this will help you....!

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

Answers

Scroll Down to See Answer ↓

∧-∧ But Read the Explanation to Make Sure ∧-∧

Answer/Explanation:

These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.

Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.

The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.

There seems to be an emerging requirement to specify cryptographic strength objectively  rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected  that U.S. Government (USG) and industry will soon require specific quantitative data to define the  point at which a cryptographic technology or product will satisfy user requirements.

Knowing that these 2 Choices Don't really look Right...

Because it our job = Wrong

Because encryption algorithm are always weak = Wrong

So It leads us to these...

To Prevent all Decryption = ?

To protect online Information = ?

But Base on the Information below:

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

I would say the Answer is To Protect Online Information.

You could Read the Explanation Above If you want to Check.

[RevyBreeze]

Time management is the ability to use time effectively.
Question 23 options:
True
False

Answers

Answer:

True

Explanation:

if you are able to manage time well, then that means you have good time management skills

(01.02
High-level programming languages are used to write a wide variety of programs, like
operating systems, scientific modeling, and general applications.

True
False

Answers

Answer:

ture

Explanation:

hope it help u

HELP PLZ 50 POINTS
What code would add a new array item named "home" to the array below?

var titles = ["score", "points"];

titles.put("home");
titles.push("home");
titles.set("home");
array.push("home");

Answers

Answer:

titles.push("home");

Explanation:

        It depends on if you want to change the original array or not, but since you are just adding on I think this is the correct option.

        "... 5 ways to add an item to the end of an array. Push, splice, and length will mutate the original array. Whereas concat and spread will not and will instead return a new array. Which is the best depends on your use case" (www.samanthaming.com)

[] Attached is from the same source

-> I think this is correct

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

- What is the use of border? Differentiate between changing color of cells and color of data class 6​

Answers

Conditional formatting makes it easy to highlight interesting cells or ranges of cells, emphasize unusual values, and visualize data by using data bars, color scales, and icon sets that correspond to specific variations in the data.

A conditional format changes the appearance of cells on the basis of conditions that you specify. If the conditions are true, the cell range is formatted; if the conditions are false, the cell range is not formatted. There are many built-in conditions, and you can also create your own (including by using a formula that evaluates.

A state in which two things are able to exist or occur together without problems or conflict...
Question 18 options:

Compatibility

Prototype

Packet

Static

Answers

Answer:

Compatibility

Explanation:

that's the definition of compatibility.

how many 2/8 pound patties can she make from 7/8 of a pound of hamburger

Answers

Answer:

3/8

Explanation:

Because 2 can't go into 7, the next best thing is 6, so 2x3 is 6 with 1/8 left over~~~~~hope this helps :) pls brainlist

the windows logon process has unexpectedly terminated

Answers

Answer

Windows corrupted

Explanation:

Try buying a new windows or resetting your laptop/pc

or your service failed to register/start

Windows login allows user accounts to log on to the system by opening the subscriber notification database and initiating user-level operations. The system may start with reduced functionality if the system resources required for Windows logon are insufficient.

What windows logon process has unexpectedly terminated?

In order to read the list of user accounts that are set up for the machine, the Windows operating system reads the registry at logon.

The Windows logon page won't appear if the data can't be read, making it impossible for users to sign in to Windows. The level of registry damage determines whether Windows can finish the startup procedure or not.

You will need to boot the computer into the Recovery Console rather than Windows in this circumstance. Use the Startup Repair tool after entering the Recovery Console. For Windows installations that won't boot, Startup Repair automates frequent diagnostic and repair activities.

Therefore, All logon attempts, however, will be blocked if the Windows registry is seriously damaged. Windows crashes when you try to log on, and it restarts after that.

Learn more about Windows here:

https://brainly.com/question/6969788

#SPJ5

Y’all got your tickets for Spider-Man No Way Home? I do

Answers

Answer:

IS IT THE NEW MARVEL MVOIE

Explanation:

which part lets you point to objects on your screen, click on them, and even move them?

Answers

Mouse lets you point to objects on your screen, click on them, and even move them.

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs.

A computer mouse is a handheld hardware input device that controls a cursor in a GUI (graphical user interface) for pointing, moving and selecting text, icons, files, and folders on your computer.

Find out more on mouse at: https://brainly.com/question/22247989

I need help with this

Answers

Answer:

It is used for the title of a page or post

Other Questions
What is the significance of globalization (e.g., magnitude, impacts, etc.)? Most importantly, what may globalization mean to you and others you know, (i.e., how might it impact your future in terms of your career and quality of life?) apakah bukti malaysia mengamalkan sistem demokrasi? Which factors led to the ming dynastys decline? choose four answers. Low taxes declining trade rebellion poor leadership increased exploration food shortages. How much government regulation of pay (minimum wage, CEO compensation), working conditions (safety), product safety, etc., should there be, if any, in your opinion? Do you think the artists who made this were effective in telling their messages clearly? why or why not? is it possible for an object moving around a circular path to have both centripetal and tangential acceleration? explain please i dont get it Which option identifies the type of budget development represented in the following scenario?The Board of Directors of a large cereal manufacturer mandates a 6 percent increase in profits for 2015 and requests operating budgets from each department.bottom-up approachtop-down approachincremental methodzero-based method Match the Professionalism term with its meaning1.Integrity2.Productivity3.Punctuality4.Initiative5.Accountabilitya.being responsible for your actions and wordsb.doing the right thing, even when no one is watchingc.doing your job as efficiently and effectively as possibled.being on timee.to take charge or do things without being told The formation of the solar system from a huge cloud of dust and gases is called the ____________. a. protoplanet hypothesis b. planetesimal hypothesis c. solar hypothesis d. nebular hypothesis e. none of these .RP.1.3 | JoAnn bought 2 shirts for $13.50 each and a purse for $8.The sales tax was 6%. What is the total she paid for herpurchase, including tax? Hey , can you help me with this math equation ? flexibility exercises are specific to what Should I write the answer as decimal or a whole number The bright warning colors scare off any predators thinking of having a tasty snack. why are we in earth. I have a system of equations I dont remember how to do :|I forgot how to solve this, and I forgot how to find the slope Which of the following expressions has a "x" term with a coefficient of 1? if the nth term is 6-2n^2 what is the 4th term? Question 5 of 10How are satire and sarcasm different?XO A. Sarcasm implicitly insults someone, while satire explicitly insultsits subject.B. Satire is used to persuade an audience, while sarcasm is used totell a joke.C. Satire is used in writing, while sarcasm is solely used in spokenconversation.D. Sarcasm is meant to incite change, while satire is meant to insultits subjectX Incorrect