what identifies a cell or a range of cells on a worksheet, and tells excel where to look for values or data you to use in a formula

Answers

Answer 1
I believe it is a cell Reference

Related Questions

Write an if statement that assigns 0.2 to commission if sales is greater than or equal to 10000.

Answers

if (sales >= 10000)
commission = 0.2;

The landing page of a web site has just been edited. Some users are complaining they do not see the updated content being displayed. What could be the possible reason(s)? (Select TWO responses)

Answers

In Software Engineering, when dealing with UI, there are a lot of attribute particular to text view that if not properly formatted may affect the users experience.

Two possible things that comes to my mind as a software developer are

The text colour may have be altered such that it matches that of the background so that it cannot be seen anymoreThe text View visibility may have been set to "INVISIBLE " or "GONE"

A little more checkup and tweaking or a search from online repository can go a long way to help the situation and the right user experience will be delivered.

Learn more about web design here:

https://brainly.com/question/25941596

g Tonya recognizes that one example of the impact of censorship on Internet service providers (ISPs) is that

Answers

law-enforcement agencies can force ISPs to identify customers who send emails using anonymous remaliers

1. Go to a popular online electronic commerce site like Amazon. Place several items in your shopping cart, and then go to check out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select Properties. You may need to use the help feature of your browser to find the security protocols in use and the certificates used to secure your transactions. What did you find out about the cryptosystems and protocols in use to protect the transaction

Answers

On Amazon.com, I found that there are a few cryptosystems and protocols in place. The most interesting thing I found was that there were 12,292 blank lines of code before anything was actually written. Amazon ensures a secure transaction by encrypting the users information on the users end, and then decrypts their information on their end.

Declare and define a function called displayConcat that displays the concatenation of the first parameter with the second. Ex: displayConcat("After", "noon") displays "Afternoon".

Answers

function displayConcat(first, second) {
// using console.log print concatenation of first and second strings
console.log(first + second);
}

displayConcat('After', 'noon');


Type the correct answer in the box

How is it possible to understand the flow of data in an organization?

Conducting ______ with each team member makes it possible to understand the flow of data in an organization.

Answers

Data ?? I think sorry if wrong ..

Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string in c++

Answers

#include
#include

using namespace std;

int CountCharacters(char userChar, string userString){
int result = 0;
for(int i = 0;i if(userString[i] == userChar){
result++;
}
}
return result;
}

int main(){
string userString;
char userChar;
cin>>userChar>>userString;
cout< return 0;
}

(50 POINTS)
Write a repl program that does the following....
Asks the user to input their score for their science test (out of 100),
If the score is less than or equal to 50, print ("You failed, I think you need to study more"),
Elif the score is greater than 50, print ("You passed, well done!").
Else print, you have not selected the right number
Note that this does not need to be in a loop.

Answers

Answer:

nope ;v

Explanation:

Each JavaScript command line ends with a(n) ____ to separate it from the next command line in the program.

Answers

The answer is :
semicolon (;)

¿Cuál es la capacidad pulmonar del hombre y la mujer?

Answers

Answer

El RV promedio en hombres es 1.2 L y para las mujeres es 1.1 L.

what is the keyboard shortcut to display formulas on the worksheet : a. CTRL+ B. CTRL+: C. CTRL+; D. ALL THE ABOVE

Answers

girl i dont know figure it out pookie

Write a python program to calculate and print the electric bill for Ethiopian Electricity Corporation. (consumer name meter number(mno),last month reading(Imr)and current month reading(cmr) of 50 customers and calculate the net bill amounts as follows: Number of unit(Nou)=cmr-lmr If Nou200 then bill =Nou*2 tax=bill*0.15 netbill=bill+tax Print all the details in the bill for all customers​

Answers

The electric bill program illustrates the use of loops (i.e. iteration)

Loops are used to execute repetitive operations

The electric bill program in Python where comments are used to explain each line is as follows:

#This iteration shows that the process is repeated for 50 consumers

for i in range(50):

   #This gets input for the consumer name meter number

   mno = input("Consumer name meter number: ")

   #This gets input for last month reading

   lmr = int(input("Last month reading: "))

   #This gets input for current month reading

   cmr = int(input("Current month reading: "))

   #This calculates the number of units

   Nou = cmr - lmr

   #This calculates the bills

   bill = Nou*2

   #This calculates the tax

   tax = bill*0.15

   #This calculates the netbills

   netbill = bill+tax

   #This next four lines print the electric bills

   print("Number of units:",Nou)

   print("Bills:",bill)

   print("Tax:",tax)

   print("Netbill:",netbill)

Read more about loops at:

https://brainly.com/question/19344465

Please answer the questions.

Answers

Answer:

10 days

Explanation:

because they have to go through all your history to see if any of that could of caused it

Answer to questions 1 is option D, answer to question 2 is option B, answer to question 3 is option D

you cannot create a folder within a folder true or false ​

Answers

HI THERE !!

the answer is false :))

correct me if I'm wrong

Answer:

true

Explanation:

Write a recursive boolean method named isMember. The method should accept two arguments: an int array and an int value. The method should return true if the value is found in the array, or false if the value is not found in the array.

Answers

Answer:

hi the answer is nothig

Explanation:

bacause i guessed

Project planning output is :

A. Top-down planning

B. Bottom up planning

C. Waterfall planning

D. Iterative planning

Answers

Answer:

A

Explanation:

The main output of Project palnning is project plan.


Which source would provide the best way to find valid information about climate change

Answers

Primary sources would be best

The primary source would provide the best way to find valid information about climate change.

What is Climate change?

Climate change may be defined as the change in the average conditions such as temperature and rainfall in a region over a long period of time. In more simple words, climate change refers to the long-term shifts in temperatures and weather patterns.

The burning of fossil fuels like coal, oil, and gas for electricity, heat, and transportation is the primary source of human-generated emissions. A second major source is a deforestation, which releases sequestered (or stored) carbon into the air.

Both of these sources are significantly responsible for the causation of climate change in the specific region over a long period of time.

Therefore, the primary source would provide the best way to find valid information about climate change.

To learn more about Climate change, refer to the link:

https://brainly.com/question/24793273

#SPJ2

What are some settings you can control when formatting columns? Check all that apply.


Answers

Answer:

1,3,4,6,7, hope that helps'

Explanation:

"1. What sorts of problems does this declaration imagine being solved through science and technology?"

Answers

‎‎‎This proclamation focuses on overcoming age, cognitive limitations, involuntary pain, and our physical confinement to the planet. They seek to help bodies live longer, human minds gain more knowledge, stop world hunger, thirst, violence, and other forms of violence, and assist humans in living on worlds other than Earth.

how does the internet bring people farther apart
use a paragraph to answer the question​

Answers

Answer:

First of all you may not be able to see your friend in person and it gets very sad. Sometimes you call them but they don't answer you because they don't have enough time to talk or they have something else to do. They won't always want to be on the internet you know, they want to go outside and get a life and not be like the FRE-KIN T-I-K T-O-K-E-R-S WHO ARE CHILDREN AND BEING VERY STU-PID AND ARE TOTAL IDIOTS AND SAY STUFF THAT MAKE NO SENSE AND TRY TO GET ATTENTION. OH DON'T BRING TOWARDS THE GA-CHA IT SO TRASH. I still hate gacha :) and I am happy. Another thing is what some people post, you see you meet friends in real life and sometimes you get to know them but you don't know what they might be doing on the internet and another thing is that they post stuff that makes you feel uncomfortable and disgusted.

You're researching a recent XSS attack against a web
application. The developer showed you the JavaScript code
used to sanitize and validate input in the browser; even if
you're not a coder, it seems like it would have prevented the
attack. What is the most likely reason the web application
was vulnerable? Choose the best response.

A. Client-side validation can be easily bypassed.
B. Input validation doesn't reliably protect against XSS
attacks.
C. Server-side validation can be easily bypassed.
D. The attacker performed an injection attack to bypass
input validation.

Answers

The most likely reason the web application  was vulnerable to a cross-site scripting (XSS) attack is: A. Client-side validation can be easily bypassed.

Cross-site scripting (XSS) attack can be defined as a security vulnerability through which malicious scripts are injected by an attacker into benign and trusted web application or website.

This ultimately implies that, a cross-site scripting (XSS) attack makes it possible for an attacker to inject malicious client-side scripts into benign and trusted web application or website that are viewed by others. Also, an XXS attack doesn't target server-side scripting languages such as:

PythonPHP

Generally, a cross-site scripting (XSS) is used by an attacker to easily bypass client-side validation and the "same-origin-policy" of web application or website, in order to gain unauthorized access to information.

Read more on XXS attack here: https://brainly.com/question/15979218

What is the purpose behind the Three Phase Commit? It improves upon the two phased commit by requiring that locks be acquired at the start of a transaction. It allows for coordination even in the event of unreliable network connections. It ensures that no shared locks are help by other connections in the event of a write operation. None of the above.

Answers

The answer is a) It improves upon the two-phased commit by requiring that locks be acquired at the start of a transaction.

Reason: The 3PC is an extension or you can say developed from 2PC that avoids blocking of an operation. It just ensures that first n sites have intended to commit a transaction that means it acquires commits or locks before the start of any transaction to avoid any blocking.

Option b) is wrong as it does not allow coordination, it just let all the other sites do their transaction if any other site is blocked, so no coordination is there between sites that they will wait till their coordinator is corrected.

Option c) is wrong as lock operations are shared between other connections as when their coordinator fails, the new coordinator agrees to the old coordinator that they had shared locks before and they can start their transaction.

Option d) is wrong as option a) is correct.

If you like the answer, please upvote.

why the computer is known as versatile and diligent device ? explain.

Answers

Answer:

Computer is called versatile and diligent device because it is used in almost all the fields for various purposes and it can perform the task repeatedly without loosing its speed and accuracy for long time.

Explain the difference between the = symbol in Java and in mathematics.

Answers

Answer:

In maths the '=' sign tells us that the two integers or variables on either side are the same, wheras in Java the '=' sign means that you are assigning the variable on the left hand side it's value which will be on the right

PLZ ANWER FAST!!!!

Use the drop-down tool to select the correct word or phrase.

How fast data travels on the network:

The ability of a network to recover after any type of failure:

Text within a document that is linked to other information available to the reader:

The way the network is laid out, including all the interconnections:

When all computers in a network are connected in a “star” formation:

A type of network that does not use a router but shares data directly between computers:

A unique location for a computer on the network:

Rules for how routers communicate with one another and send data:

Answers

It should be noted that the speed of fast data on a particular network is known as bandwidth.

The ability of a network to recover after any type of failure is known as fault tolerance.

Text within a document that is linked to other information available to the reader is called hypertext.

The way the network is laid out, including all the interconnections is known as network topology.

When all computers in a network are connected in a “star” formation, it's known as a star topology.

A type of network that does not use a router but shares data directly between computers is known as peer-to-peer.

A unique location for a computer on the network is known as the IP address.

Rules for how routers communicate with one another and send data are known as the router protocols.

Learn more about bandwidths on:

https://brainly.com/question/8154174

Answer:

Text within a document that is linked to other information available to the reader is called

✔ hypertext

.

A unique location for a computer on the network is its

✔ IP address

.

The

✔ fault tolerance

is the ability of a network to recover after any type of failure.

The computer that responds to requests from the client computer is known as the

✔ server

.

A

✔ queue

is an ordered list of tasks waiting to be performed.

Explanation:

just did it.

The second last character in a String str can be accessed by
a) str[-3]
b) str[-2]
c) str[2]
d) str[3]

Answers

Answer:

B.

Explanation:

-1 is the last element in a string. Starting from -1, count backwards and you get your answer.

Question #2
Dropdown
Complete the sentence.
A_____
number is composed of only zeros and ones.

Answers

What are the answer choices? If none then i say "A prime

number is composed of only zeros and ones."

Answer: Binary

Explanation: Binary numbers use the base-2 numeral system (binary). This system uses only two symbols: "0" (zero) and "1".

What term describes the story of a game?
tale
fable
narrative
setting

Answers

I would say tale because a tales like more for stuff like games

Answer:

tale.

Explanation:

because the other answers make 0 sense.

The current annual interest rate is 5 percent, and you are taking out a 20-year loan with a monthly end-of-month payment. If you can afford monthly payments of $3000 per month, what is the most you can borrow?

Answers

Answer:

720k.

Explanation:

Here’s my last question

Answers

Answer:

Can't find it lolol

Explanation:

Where?

I’m bored too … hey
Other Questions
11. The ease with which water can passthrough a rock or sediment is calleda. permeability c. porosity.b. carbonation. d. velocity Enter the explicit rule for the geometric sequence ...60, 12, 12/5, 12/25, 12/125 Tu ___________________ (souffrir) toujours de cette douleur The December 31, Year 1, financial statements of Edwards Co. (a privately held company) were available to be issued on March 1, Year 2, and were actually issued on March 3, Year 2. As of December 31, Year 1, Edwards Co. had 250,000 shares of common stock outstanding. On February 15, Year 2, Edwards Co. issued 500,000 more shares of common stock. As a result of this transaction, Edwards Co. must: __________ explain why the importance of a good credit score is a myth. Nationalism encourages a sense of pride among its citizens and preserves our historyTrueFalse Assume that you are going to open a checking account. You are examining different banks and banking accounts to choose a bank account for your needs. Which of the following statements should not be one of your reasons for examining different banks? a. Being more informed leads to being better prepared to make financial decisionsb. Bank E offers you a chocolate bar for filling out an application for checking and credit at the same time.c. Banks could have charges that you do not know about until reading carefully.d. You will become more aware of how well the banks meet your particular needs. Which items are minerals or contain minerals? Check all that apply.asap please:)-lawn fertilizer-topsoil-a diamond necklace-a copper electrical wire-a cellular phone What is the color of normal nasogastric drainage in patients with nasogastric (NG) tube? Pink Green Brown Coffe-ground Change the following to improper fraction or mixed number 35/8. What is the meaning of life span or life cycle Select the correct texts in the passage. Which line of dialogue best develops the character of Demetrio in the cultural setting? adapted from The Underdogs by Mariano Azuela "Tonight or tomorrow at the latest we'll meet the Federals. What do you say, boys, shall we let them find their way about these trails?" Demetrio asked. The ragged crew jumped to their feet, uttering shrill cries of joy; then their jubilation turned angry again and they gave vent to threats, oaths and imprecations. "Of course, we can't tell how strong they are," said Demetrio as his glance traveled over their faces in scrutiny. "Do you remember Medina? Out there at Hostotipaquillo, he only had a half a dozen men. Well, he held back the soldiers, didn't he? And he defeated them, too. " "We're every bit as good as Medina's crowd!" said a tall, broad-shouldered man with a black beard and bushy eyebrows. "Viva Demetrio Macias," they all shouted. The slope of a line running through points (6, 2) and (5, 7) is: 5. -5. 1. -1. Learning Task 5: Answer the following questions in 2-3 sentences. Write them on a separate sheet of paper. 1. What are the common elements and principles found in the artworks? 2. How did they use those elements and principles in their design? 3. What made these designs different from other designs from other provinces?I NEED THE ANSWER NOWWW!!!!! What is number 10 for this? what is science explain Vous avez t tmoin une injustice. Raconter??? Question: What is the number of parking space covered by the car? What is 5+5 .................................................. Accelerated mammary gland development in intellectually disabled females.