Which function is similar to the find and replace feature

Assignment Help Basic Computer Science
Reference no: EM13805509

Question 1. In a tab-delimited file, ________ separate the data.

commas

tabs

spaces

hyphens


Question 2. The Text Import Wizard displays when a(n) ________ file is imported.

Access database

XML

CSV

txt

Question 3. Which of the following is NOT a method for refreshing data?

Click the Refresh All command.

Save the Excel workbook.

Click the Refresh All arrow, then click Refresh.

Right-click in a range of data and then select Refresh.

Question 4. The Convert Text to Columns Wizard allows you to choose the file type, such as Delimited or ________ width.

Fixed

Mixed

Divided

Text

Question 5. Which of the following is a frequently used function to manipulate txt?

CONCATENATE

PMT

IF

DATE

Question 6. To change the text string Jack Doe to JACK DOE, use the ________ function.

UPPER

LOWER

PROPER

CONCATENATE

Question 7. Which of the following will produce the same result as the CONCATENATE function?

=A4&B4

=A4+B4

=A4B4

=A4,B4

Question 8. When the data source you select for a mail merge is an Excel workbook that has more than one worksheet, what does Word do?

Automatically uses the data from the first worksheet in the workbook.

Automatically uses the data from the last worksheet in the workbook.

Displays a list of the worksheet names and lets you pick which one to use.

Displays an error message and is unable to continue.

Question 9. In Excel, the Compare and Merge command is located on which of the following tabs?

Review tab

Data tab

File tab

None of the above

Question 10. If first and last names are combined in a single column, you can split them into two separate columns using the ________.

Split Names Wizard

PivotTable feature

CONCATENATE function

Convert Text to Columns Wizard

Question 11. The ________ command displays all comments in the entire workbook.

Track Changes

Show Ink

Show/Hide Comment

Show All Comments

Question 12. If you have ________ configured as your e-mail client, you can e-mail an Excel file directly from Excel.

Gmail

Hotmail

Yahoo

Outlook

Question 13. To display the Properties dialog box, click ________ in the Info section of the Backstage view and select Advanced Properties.

Properties

Show All Properties

Permissions

Versions

Question 14. Which function is similar to the Find and Replace feature?

CONCATENATE

SUBSTITUTE

UPPER

PROPER

Question 15. You can identify duplicate rows in a table using the _________.

Data Validation menu in the Data Tools group on the Data tab of the Ribbon

Error Checking command in the Formula Auditing group on the Formulas tab of the Ribbon

PivotTable command in the Tables group on the Insert tab of the Ribbon

Conditional Formatting command in the Styles group on the Home tab of the Ribbon.

Reference no: EM13805509

Questions Cloud

Write summary of why you are at risk of phishing attacks : Write a summary of the article "Why You Are At Risk Of Phishing Attacks" by Joseph Steinberg.
Assessment of applicable laws : A brief assessment of applicable laws or regulations that must be considered. Recommendations about how to implement the initiatives to remain compliant while positing the organization for success
Conduct a feasibility study : Establish criteria for identifying and evaluating investment opportunities. Consider the following components:
Faultsag sexual assault allegation : Write an appeal to the CEO of a company for a job that you was qualifed for but got deny due to an faultsag sexual assault allegation against you at your last company. Explain why you should be given a second chance at a career?
Which function is similar to the find and replace feature : Which function is similar to the Find and Replace feature. In Excel, the Compare and Merge command is located on which of the following tabs
What best practices should a development manager use : What occurs during the coding activity of the development phase? What best practices should a Development Manager use when the project enters the Coding Phase
Interpret the value of price elasticity : If a 3 percent increase in price leads to a 5 percent increase in quantity supplied, then. Moving along a demand curve, the quantity demanded decreases 8 percent when price increases 10 percent. Find the arc price elasticity of demand over the price ..
Prepare for the next period of economic challenge : Consider how the economy may be influencing your life. What has the most impact on you? Has a similar economic condition happened in the past? What is the likelihood it could happen again? What should you do to prepare for the next period of economic..
Due to the increased globalization of financial markets : Due to the increased globalization of financial markets, we can expect all of the following, except:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How spki be augmented to support policy

Consider a policy that, for reasons of separation of duties, does not allow an entity to exercise the rights it may grant (delegate) to others. How could SPKI be augmented to support such a policy?

  Cost benefits of technology

Cost Benefits of Technology

  Explaining pros and cons of coralcdn

Provide a summary of CoralCDN. Contrast its operation with that of Akamai. What the pros and cons of CoralCDN (as compared to Akamai)?

  Distribute music on the internet.

an architecture for a system (such as iTunes) that is used to sell and distribute music on the Internet. What architectural patterns did you use as the basis for this architecture? Why are these patterns appropriate?

  Lists and arrays can be valuable tools

Lists and arrays can be valuable tools

  Define business strategies for implementation

Create an implementation plan for your organization, a project from the websites such as or a state RFP site.

  Complete the it system connection for different it systems

Complete the IT System Connection Table for four different IT systems. The table is located on your student website.

  When the jmpc field in the microinstruction is enabled

Assume that when the JMPC field in the microinstruction is enabled (set), MBR is ORed with NEXT_ADDRESS to determine the address of the next microinstruction to be executed

  An analysis of the security issues associated with batch fil

For this writing assignment you will be required to provide an analysis of the Security issues associated with batch files, Visual Basic and other forms of scripting.

  How to convert a string of binary into decimal

how to convert a string of binary into decimal and a decimal into binary using java

  Some businesses and organizations use active directory

Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access.

  How do you create a class that includes three variables

How do you create a class named commission that includes three variables: a double sales figure, a double commission rate, and an integer commission rate. Create two overloaded methods named computeCommission().

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd