What G-Suite Apps integrate with Forms
Google Classroom
Google Sites
Google Sheets
All of the Above

Answers

Answer 1

Answer:

google sheets

Explanation:


Related Questions

cheryl, the network administrator, has been asked to create a virtual machine that can run an application without any modifications to the os. what is her best option to accomplish this task?

Answers

The best option to accomplish this task is installing virtual machine.

A network administrator who has been tasked with creating a virtual machine that can run an application without modifying the OS has the option of creating a virtual machine with the same OS as the physical computer. A virtual machine is a program that allows you to run an operating system in an application window on your desktop. One of the primary advantages of a virtual machine is the ability to run multiple operating systems on the same computer at the same time.

This is useful for a variety of reasons, such as testing software and operating systems, running old software and operating systems, and running software on an operating system that it was not designed for.

Learn more about network administrator: https://brainly.com/question/29039092

#SPJ11

Draw a flow chart that accepts mass and volume as input from the user. The flow chart should compute and display the density of the liquid.( Note: density = mass/volume ).​

Answers

Answer:

See attachment for flowchart

Explanation:

The flowchart is represented by the following algorithm:

1. Start

2. Input Mass

3. Input Volume

4 Density = Mass/Volume

5. Print Density

6. Stop

The flowchart is explained by the algorithm above.

It starts by accepting input for Mass

Then it accepts input for Volume

Step 4 of the flowchart/algorithm calculated the Density using the following formula: Density = Mass/Volume

Step 5 prints the calculated Density

The flowchart stops execution afterwards

Note that the flowchart assumes that the user input is of number type (integer, float, double, etc.)

Draw a flow chart that accepts mass and volume as input from the user. The flow chart should compute

(Refer to the basic risk assessment matrix tool in the Risk Management Handbook) What would be the level of risk for an experienced pilot who encounters an improbable hazard with marginal consequences?

Answers

The level of risk for an experienced pilot who encounters an improbable hazard with marginal consequences would be considered low.

To determine the level of risk, we need to refer to the basic risk assessment matrix. Typically, a risk assessment matrix consists of two dimensions: the likelihood of an event occurring and the consequence of that event. Each dimension is divided into categories, such as low, medium, and high, and the combination of these categories helps determine the overall level of risk.

In this case, the hazard is considered improbable, indicating a low likelihood of occurrence. Additionally, the consequences are marginal, suggesting that the impact of the hazard would be minimal. Given these factors, we can assign a low rating for both likelihood and consequence.

Based on the low likelihood and marginal consequences, the overall level of risk for an experienced pilot encountering this improbable hazard would be considered low. This indicates that the pilot's exposure to harm or negative consequences is minimal. However, it's important to note that risk assessment is a dynamic process, and it's crucial to continuously monitor and reassess hazards to ensure ongoing safety and mitigate potential risks.

To know more about Hazard, visit

https://brainly.com/question/28221577

#SPJ11

Throughout the reflection, make sure you have a copy of the Student Guide and your data tables. Complete the
paragraph using the drop-down menus
In this lab, you observed how pollutants affected the
of water. You also modeled and observed how
pollution affected freshwater sources, including surface water and the water in the​

Answers

Answer:

1) pH

2) ground

Can I have a brainliest?

Explanation:

In this lab, you observed how pollutants affected the ____ of water. You also modeled and observed how pollution affected freshwater sources, including surface water and the water in the  _______.

In this laboratory, you observed how pollutants affected the pH of water.

What is pH?

pH literally means the power of hydrogen ions and it can be defined as a measure of the molar concentration of hydrogen ions that are contained in a particular solution.

In Chemistry, the power of hydrogen ions (pH) is typically used to specify the acidity, neutrality or basicity of any chemical solution such as water.

In this laboratory, students were made to observe how pollutants affected the pH of water and they modeled how pollution affected freshwater sources, including surface water and the water in the​ ground.

Read more on pH here: brainly.com/question/24233266

1)write a python program to check wheter the given number is even or odd
2) write a python program to add any 5 subjects makrs, find sum and average (average=sum/5)
3)write a python program to print numbers from 1 to 100 using loops

Answers

Answer:

n = 16

if n%2:

 print('{} is odd'.format(n))

else:

 print('{} is even'.format(n))

m1 = 5

m2 = 4

m3 = 6

m4 = 8

m5 = 9

sum = m1+m2+m3+m4+m5

average = sum/5

print("The sum is {}, the average is {}". format(sum, average))

for i in range(1, 101): print(i, end=",")

Explanation:

Above program does all three tasks.

Answer:

1) num1 = int(input("Enter the number to be checked: "))

if num1%2==0:

   print("Your number is an even number!")

else:

   print("Your number is not even!")

2) maths = int(input("Enter your maths mark: "))

english = int(input("Enter your english mark: "))

social = int(input("Enter your social mark: "))

science = int(input("Enter your science mark: "))

computer = int(input("Enter your computer mark: "))

Sum =  maths + english + social + science + computer

average = Sum / 5

print("Sum of your marks are:",Sum)

print("average of your marks are:",average)

3) num = 0

while num <= 99:

   num+=1

   print(num)

Explanation:

Welcome.

write about storage
(should be in easy words)​

Answers

Answer:

Answer to the following question is as follows;

Explanation:

The process of storing digital information in a data storage media using computing technology is known as storage. Storage is a technique that allows a computer to keep data indefinitely or intermittently. Computer storage capacity and electronic data management are other terms for storage.

is a graphic representation that distills a lot of information into an easily interpreted visual format.

Answers

The name of a graphic representation that distills a lot of information into an easily interpreted visual format is an "infographic."

Infographics are a popular way to present complex data, statistics, and information in a visually appealing manner that can be easily understood by viewers. These graphics often use a combination of images, charts, graphs, and text to convey the information in a concise and engaging way. Infographics can be used for a variety of purposes, from marketing and advertising to education and journalism. They are particularly useful in today's digital age, where information overload is a common problem, and people need a quick and easy way to process large amounts of data.

#SPJ11

Learn more about Graphic Representation : https://brainly.com/question/28350999

you need to create a shared folder on a computer running windows 10. it must have following parameters: located in c:\corpdata; domain users of practicelabs domain must have full access to it. which windows powershell command you need to run?

Answers

There are no quotation marks around the security group Domain Users or the domain name practicelabs, which prevents Windows from mapping account names to security IDs.

What is meant by Domain users?

Any user whose username and password are saved on a domain controller rather than the machine they are logging into is referred to as a domain user. The computer queries the domain controller to determine your privileges when you log in as a domain user.

Users who are added to the domain users group on a domain controller are known as domain users. At the server, these domain users can be centrally managed. While local users are those who have been added to the local system. You can choose users in BPC from one of these options alone or in combination.

The complete question is : You created a folder named "codeplans" on a domain member server. You want to share this folder and entered the following Windows PowerShell command:

New-SmbShare -Name "codeplans" -Path "c:\corpdata" -Fullaccess practicelabs\domain users

You get the following error message which you saved as a screenshot. What is cause of this error message?

To learn more about Domain user refer to :

https://brainly.com/question/14481481

#SPJ1

Explain two protocols to enhance cellular networks capacity?


Notes:
- You need to cite used references in your submission.

Answers

The mobile network capacity can be improved by increasing the radio spectra or also increasing the re-utilization of a given spectrum.

What is mobile network capacity?

The mobile network capacity refers to the final volume of information (data) that can be transferred to a particular customer.

A mobile wireless system refers to a given network where the connection to and from customers consists of wireless technology.

The mobile network capacity is usually improved in a given area by increasing the radio spectra or increasing the re-utilization of the spectrum.

Learn more about mobile wireless systems here:

https://brainly.com/question/1763761

Sarah works in a coffee house where she is responsible for keying in customer orders. A customer orders snacks and coffee, but later, cancels the snacks, saying she wants only coffee. At the end of the day, Sarah finds that there is a mismatch in the snack items ordered. Which term suggests that data has been violated?

Answers

Answer:

Stack

Explanation:

Stack is a linear data structure that follows a particular order in the way an operation is done or sequence a job is completed.

It uses either LIFO ( Last In, First Out) which is also known as first come first served sequence or FILO (First In, Last Out) sequence.

There are several real life examples of which we can use the example of replacing the snack items Sarah brought for the customer.

If Sarah used the LIFO method, it means she replaced the snack items first ontop of the already existing snack items that's why there is a mismatch.

Answer:

c

Explanation:

When using code completion, you can accept the current selection in the suggestions list with Ctrl+Shift+Enter. IntelliJ IDEA Community will not only insert the selected string, but also turn the current code construct into a syntactically correct one (balance parentheses, add missing braces and semicolons, and so on). T/F?

Answers

True. When using code completion in IntelliJ IDEA Community, you can accept the current selection in the suggestions list with Ctrl+Shift+Enter. IntelliJ IDEA will not only insert the selected string,

but also turn the current code construct into a syntactically correct one, including balancing parentheses, adding missing braces and semicolons, and so on. This feature is known as "smart completion" and can be a great time-saver for developers. When using code completion, you can accept the current selection in the suggestions list with Ctrl+Shift+Enter. IntelliJ IDEA Community will not only insert the selected string, but also turn the current code construct into a syntactically correct one (balance parentheses, add missing braces and semicolons, and so on).

learn more about  IntelliJ IDEA   here:

https://brainly.com/question/31678479

#SPJ11

(576)8. In to ( )16 ( )8

Answers

Answer:

around ()72381 approx

Explanation:

approximately not accurate

Which of the following is a network vulnerability scanner? (Choose two.) A) Nessus B) Keylogger C) Nbtstat D) Nmap E) pathping

Answers

The network vulnerability scanners among the given options are Nessus and Nmap.

How are Nessus and Nmap categorized as network vulnerability scanners?

Nessus and Nmap are both widely recognized network vulnerability scanners that help organizations identify and address security vulnerabilities within their computer networks. Nessus is a powerful and comprehensive vulnerability scanning tool that scans networks, systems, and applications for known vulnerabilities. It provides detailed reports and recommendations to help prioritize and mitigate potential risks.

Nmap, on the other hand, is a versatile network exploration and auditing tool that can also be used for vulnerability scanning. It helps discover hosts, services, and open ports, allowing security professionals to identify potential entry points for attacks. Both Nessus and Nmap play crucial roles in ensuring the security of networks by enabling proactive vulnerability management and risk reduction.

Learn more about Nessus and Nmap

brainly.com/question/32150075

#SPJ11

7
Try it
Jeremy knows that a big test is coming up in two weeks.
Jeremy is nervous about the test because there is so
much information to study. He understands the material,
but is having a hard time getting started on studying. He
feels frustrated and overwhelmed.
What steps should Jeremy take to get himself motivated
to study for the test?

Answers

In order to enhance his drive to study, Jeremy might divide the studying into smaller, doable activities, make a study timetable with clear objectives, get rid of distractions, and give himself rewards for accomplishments.

How would you calculate the weekly average of your study hours?

We must keep track of our study time for the entire week in order to determine the average number of hours spent studying. Then, calculate the total number of observations and divide it by the total number of observations, in this case, 7, to get the requisite average.

What test-taking techniques are recommended for all best answer tests?

The following are test-taking techniques that should be used on all exams: reading the instructions thoroughly. Apply any special guidance. highlighting significant

To know more about studying visit:-

https://brainly.com/question/30092851

#SPJ1


What do the numbers 0s and 1s actually represent inside a computer?

Answers

Answer:

Binary.

Explanation:

Binary, the off and on, Is how computers think.

You think code is Function(Os,35,Export) and stuff like that? Thats trillions of binary lines to make that. Binary is the very fabric of code. modern code engines are very organized binary to make predefined functions so your brain doesnt have to manually think of quadrillions of off and on switches for each function you assign.

4. Let T(n) = 2T(n/2) + n. With the help of substitution method check whether T(n) is 0 (n log n)

Answers

T(n) is o(n log n) by the substitution method.in summary, using the substitution method, we have shown that t(n) = 2t(n/2) + n is o(n log n) by assuming t(k) ≤ c * k log k for all k < n and verifying the inequality .

yes,

using the substitution method, we can check whether t(n) is o(n log n). by assuming t(k) ≤ c * k log k for all k < n, we substitute it into the recurrence relation to verify the inequality.

to check whether t(n) is o(n log n) using the substitution method, we assume that there exists a constant c > 0 such that t(k) ≤ c * k log k for all k < n.

substituting this assumption into the recurrence relation t(n) = 2t(n/2) + n, we have:

t(n) = 2(c * (n/2) log(n/2)) + n      = c * n log(n/2) + n

     = c * n (log n - log 2) + n      = c * n log n - c * n log 2 + n

next, we analyze the right-hand side of the assumption, c * n log n:

c * n log n = n (c log n)

now, we need to show that t(n) ≤ c * n log n for some choice of constant c. we observe that c * n log n - c * n log 2 + n ≤ c * n log n if - c * n log 2 + n ≤ 0.

simplifying further, we have - c * n log 2 + n ≤ 0c * n log 2 ≥ n

c * log 2 ≥ 1c ≥ 1/log 2

since c is a constant, we can choose a sufficiently large value for c such that the inequality holds.

Learn more about substitution  here:

https://brainly.com/question/31798478

#SPJ11

Lucy is in charge of creating a user interface for a new app. During what phase of the project should she expect to complete her work?

A.
alongside the development of the app

B.
after the app has been developed

C.
during the testing phase

D.
during the design phase

Answers

Answer:

C option

Explanation:

Because in testing phase the game has been developed and test for errors in game.

Which option would provide the most accurate ethnographic history of a refugee's experiences?
A) The official government account given to the news media
B A political scientist's published observations
C An audio recording of that refugee telling her story

Answers

Answer:

I thinks it b

Explanation:

Or a it can't be c because I doesn't make sense

An audio recording of that refugee telling her story. The correct option is C.

Thus, The most authentic ethnographic history of a refugee's experiences would likely come from an audio recording of the refugee describing her story.

Ethnography is a type of research that involves in-depth participation in the community or culture being researched as well as close observation. Researchers can learn a great deal about the ideas, feelings, and individual experiences of refugees by listening to their first-person accounts of their journey and displacement.

The refugee can tell their tale in their own words on an audio recording, keeping their own viewpoint and cultural background. Intricacies, feelings, and details that would be missed in other types of documentation can be captured with this technique.

Thus, An audio recording of that refugee telling her story. The correct option is C.

Learn more about Audio recording, refer to the link:

https://brainly.com/question/32433391

#SPJ7

the port allows a remote administrator to dial into the router through an external modem. a. auxiliary c. virtual b. console d. terminal

Answers

The port that allows a remote administrator to dial into the router through an external modem is the auxiliary port.  Thus, the correct option is a.

Explanation is as follows:
The auxiliary port on a router is specifically designed for connecting external devices, such as a modem, to enable remote administration. This port allows a remote administrator to establish a dial-up connection with the router, which can be useful for troubleshooting or configuring the device remotely.

The virtual port (c) is not a specific type of port on a router.

The terminal port (d) is not a standard port designation on a router.

Conclusion is as follows:
In conclusion, the correct answer is a. auxiliary port. Thus, the correct option is a.

To know more about router visit

https://brainly.com/question/31845903

#SPJ11

a company offers a hardware security appliance to customers that provides remote administration of a device on the customer's network. customers are not authorized to alter the configuration. the company deployed a software process to manage unauthorized changes to the appliance, log them, and forward them to a central repository for evaluation. which of the following processes is the company using to ensure the appliance is not altered from its original configured state? a. ci/cd b. software assurance c. anti-tamper d. change management

Answers

"the process that the company is using to ensure the appliance is not altered from its original configured state is change management. The option d is correct.

The process that the company is using to ensure that the appliance is not altered from its original configured state is change management. "Change management" is the process of managing changes to a system or product in a structured and controlled manner. It includes all activities that are required to introduce, modify, or remove hardware, software, or services from a system, product, or environment.The company has restricted customers from making changes to the appliance's configuration, and they are using software to manage unauthorized changes. The software is used to log the unauthorized changes and forward them to a central repository for evaluation. This process helps the company identify any changes made to the appliance, evaluate the changes, and take appropriate measures to ensure that the appliance is not altered from its original configured state. Hence, the process that the company is using to ensure the appliance is not altered from its original configured state is change management.
visit here to learn more about original configured state:

https://brainly.com/question/14989344

#SPJ11

what might it mean from a troubleshooting standpoint if you ""ping"" your gateway and it times out?

Answers

If the "ping" gateway returns a timeout, an error occurred in the connection between the system's network and the gateway.

Troubleshooting:

Problem-solving through troubleshooting Troubleshooting is a type of problem-solving that is often used to fix broken processes or products on a machine or system. In order to resolve a problem and restore product or process operation, it is a methodical, logical search for its source. It is necessary to perform troubleshooting in order to identify the symptoms.

Troubleshooting is a methodical procedure that is used to determine the root cause of a computer system error and resolve any relevant software or hardware issues. A logical and methodical approach to problem solving is essential to its successful resolution.

Learn more about troubleshooting:

brainly.com/question/28508198

#SPJ4

name two different colors used in the python program file window.name the type of program content that has each color ......

whoever answer this correct i will rate them 5 stars and a like .....
please urgent ​

Answers

In the Python program window, black is used for code and syntax, while white is used as the background.

How is this so?

1. Black  -  The color black is typically used for the program's code and syntax. It represents the actual Python code and includes keywords, functions, variables, and other programming constructs.

2. White  -  The color white is commonly used as the background color in the program window. It provides a clean and neutral backdrop for the code and makes it easier to read and understand.

Learn more about python program at:

https://brainly.com/question/26497128

#SPJ1

If you have not been contracted to perform an attack against a target system, and take it on as a target of opportunity to quickly make some money by selling PII, you are what type of hacker

Answers

A hacker that takes an opportunity to quickly make some money by selling PII is known as a Black Hat (criminal hacker).

What is a PII?

PII is an abbreviation for personally identifiable information and it can be defined as any type of information (data type) that can be used by individuals or business firms on its own or with other relevant data, so as to identify a specific individual.

In Cybersecurity, some examples of personally identifiable information (PII) include the following:

Full nameReligious and political beliefs.Social Security numbers (SSN).Email addressHome address

In conclusion, a Black Hat (criminal hacker) is a type of hacker that takes an opportunity to quickly make some money by selling PII.

Read more on PII here: https://brainly.com/question/24439144

Modify the binary search algorithm to take the upper of the two
middle array elements in case the input array has even length. In
other words, in the binary search algorithm, replace
Trace the action

Answers

The binary search algorithm can be modified to handle arrays with even lengths by considering the upper of the two middle elements as the pivot. This modification ensures that the algorithm works correctly and efficiently for arrays of any length.

In the traditional binary search algorithm, the pivot is chosen as the middle element of the array. This works well for arrays with odd lengths, but poses a challenge when the array length is even. In such cases, there is no exact middle element. To address this, we can modify the algorithm to consider the upper of the two middle elements as the pivot.

When dividing the array in half during each iteration, we can calculate the middle index as (low + high) // 2. However, for arrays with even lengths, we can modify this calculation to (low + high + 1) // 2 in order to choose the upper middle element as the pivot. By making this modification, the binary search algorithm can handle arrays of any length correctly. This ensures that the search process efficiently narrows down the search space and accurately finds the target element, regardless of the array's length.

Learn more about array here-

https://brainly.com/question/30757831

#SPJ11

x = 100
if x > 0:
x -= 1
print(x)

Answers

Answer:

Explanation:

Program  and Reault:

x = 100if x &gt; 0: x -= 1print(x)

negative feedback is essential within axes of the endocrine system because it helps

Answers

Negative feedback is an essential mechanism within the axes of the endocrine system because it helps regulate hormone levels and maintain homeostasis in the body.

The endocrine system consists of glands that produce and release hormones, which act as chemical messengers to regulate various bodily functions. Negative feedback refers to a feedback loop where the response to a stimulus opposes the initial change, helping to maintain stability.

In the endocrine system, negative feedback plays a crucial role in controlling hormone levels. When hormone levels rise, they trigger a response that inhibits further hormone secretion. Conversely, when hormone levels decrease, it stimulates the release of more hormones. This feedback loop helps prevent excessive hormone production or deficiency, ensuring a balance within the body.

For example, the hypothalamus-pituitary-adrenal (HPA) axis regulates the stress response. When the body is under stress, the hypothalamus releases corticotropin-releasing hormone (CRH), which signals the pituitary gland to release adrenocorticotropic hormone (ACTH). ACTH then stimulates the adrenal glands to produce cortisol. As cortisol levels rise, they inhibit the release of CRH and ACTH, creating a negative feedback loop that helps maintain cortisol levels within a normal range.

In conclusion, negative feedback is crucial within the axes of the endocrine system as it allows for precise regulation of hormone levels. It helps maintain homeostasis by ensuring that hormone production is neither excessive nor deficient, thereby promoting optimal functioning of the body. The negative feedback mechanism within the endocrine system is vital for overall health and well-being.

To know more about hormone levels visit:

https://brainly.com/question/30285838

#SPJ11

what is amoeba cell do? max amount of points so pls answer​

Answers

Answer:

Ameoba is an organism which is unicellular and is a free-living cell. it is also a eukaryotic organism ( it has well-defined, membrane-bound cell organelles).

An amoeba cell has to carry out all the functions needed for its survival such as injection of food, digestion of food, excretion of waste, etc

An Amoeba cell is a unicellular organism. It is eukaryotic and has well-defined, membrane-bound cell organelles. Amoebas function as their own living body, so they create energy, move around, and throw out waste on their own.

What message did vera mukhina convey in her work entitled the worker and the collective farmworker?

Answers

Answer:

She glorified the communal labor of the Soviet people

Which of the following is not a key component of a structure?
A. Name
B. Properties
C. Functions
D. Enumerations

Answers

Answer:

D i think

Explanation:

Two people, Alice and Bob are using the key sharing algorithm. They have chosen a clock size of 17 and a base of 5. Alice's private number is 4, while Bob's is 6. The first step in creating the shared key is for each party to generate a PPN based on their private number, the base and the clock size. Alice has already sent her PPN to Bob. She receives Bob's PPN, which is 2. Alice uses Bob's PPN (2), her private number (4), and the clock size (17) to calculate the shared key. What is it

Answers

Answer:

fsfsf

Explanation:

Other Questions
This gene encodes a protein and you would like to determine whether the protein localizes to the nucleus or the cytoplasm. how would you examine where the protein localizes in the cells? Calculate the mass defect of Ti-48 (atomic mass = 47.947947 amu)Proton: 1.00783 amuNeutron: 1.00866 amu what is the number of feathers in pigeon body Question 15 3 pts Nathan Inc. provides the following cost information for producing 12,000 units of inventory during the current month: Direct materials Direct labor $56,000 78,000 28,000 30,000 Variable manufacturing overhead Fixed manufacturing overhead Variable Selling and Administrative Costs Fixed Selling and Administrative Costs 28,000 15,000 The product costs per unit under variable costing would be a. $19.58 per unit b. $15.50 per unit c. $16 per unit d. $13.50 per unit can you fit a raccoon in your bu11hole mathematically why you think your claim is the best explanation for Jordan Joness improved performance. Can someone do this for me? Which fact from "Solar Conjunction: When the Sun Gets in the Way" would be LEAST important to include in a summary of the blog post? - The Solar Conjunction period starts around April 4, 2013, and lasts until May 1, 2013. - During this time, science observations are suspended. - Without accurate measurements, the Mars Reconnaissance spacecraft cannot perform precise targeted science observations. One Mars year is about 1.9 Earth years. Most viruses with helical capsid symmetry contain _______ as their nucleic acid. In the tcp/ip model, what layer is considered so simple that it is ignored entirely? imagine you have just met the person who is going to be your roommate next year. on the basis of what psychologists know about judgments of personality, to whom would you ask questions about what the new roommate is like, and why? A Carnot heat engine with thermal efficiency 110110 is run backward as a Carnot refrigerator.What is the refrigerator's coefficient of performance? Express your answer using one significant figure. Primary cells in the immune response that recognize and react with antigens in the body is called: _______ why the Holy Land is an important site for each faith < PLEASE HELP ME I'LL GIVE BRAINLIEST >Explain to me in six sentences, what the abolitionist movement was? describe how the labeling theory would explain why some students are successful in school, while others are not. State OLLORS Assignment 5 uses of Database Management. Answer Match the trigonometric expressions to their solutions.cos [140- (50 +30)]3tan 240-6-2cos 1501ResetNextsin 255 Which was an advantage held by the North over the South at the start of the Civil War?Question 3 options:It had many cotton plantations to provide fabric for uniformsIt had the support of the British navy in blockading southern portsIt had a smaller population that required less food and other suppliesIt had a far more extensive network of railroads and telegraph lines Which of these methods can you use to insert a new row in a worksheet?(Select all that apply.)A Right-click or access the context menu for a row number, select InsertB Right-click or access the context menu for a column header, select InsertC Right-click or access the context menu for a cell, select Insert Entire RowD Home, Cells group, Insert > Insert Sheet Rows(will give thanks and brainlet)