1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
1 year ago
9

To set up scenarios,then set up a list, then set up the reference cell. to set up the cells that display the output results from

the scenario. what do you use
Computers and Technology
1 answer:
Gennadij [26K]1 year ago
3 0

To  set up the cells that display the output results from the scenario, you will use data table , then Vlookup and Choose.

<h3>What do you use to set up the cells that display the output results from the scenario?</h3>

In setting up the cells that display the output results from the scenario, then the first thing needed is data table which is necessary when  setting up a list.

Followed by the , Vlookup  which is used in the setting up of  the reference cell and lastly Choose.

Learn more about  reference cell on:

brainly.com/question/21644802

#SPJ1

You might be interested in
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
1 year ago
What is the answer ????​
zzz [600]

Answer:

august po

Explanation:

pabrainliest ty

5 0
2 years ago
A technician has been asked to upgrade a processor and needs to do some research. The computer is just a couple of years old. Wh
DanielleElmas [232]

Answer:

The two best options can be processors like inlet i7 4.0 GHZ 8th generation processor, and two popular models are core and Pentium for inlet. Similarly for AMD we have 4 GHZ 8 core AMD processors. And two very popular examples are Athlon and Phenom.

You need to check the Graphics, clock speed etc. as well to end up with the best processor. Also make sure that it is motherboard compatible, and to the motherboard that you are having, If number of core is more and frequency is high, it means Processor is better, and same thing applies for generations as well.

Explanation:

The answer is self explanatory.

6 0
3 years ago
Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a
vagabundo [1.1K]

Answer:

G m a i l

Explanation:

G m a i l by Google is the main commercial email provider to Android Phones. This is because it offers so many features that other email provider do not. One of this is the ability to backup your data, including contacts, messages, and others. This features along with other features makes Google g m a i l account the best option for Android users.

8 0
3 years ago
Please select the word from the list that best fits the definition
Troyanec [42]

Answer

Linguistics

Explanation:

linguistics can be defined as scientific study of language and its structure, including the study of grammar, syntax, and phonetics.

there are some  Specific branches of linguistics  and that include computational linguistics, comparative linguistics, and structural linguistics.

study material into songs can also be defined as a linguistic hence linguistic is the correct option for you question

6 0
3 years ago
Read 2 more answers
Other questions:
  • Technology progresses so new needs can be satisfied.<br><br> A. true<br><br> B. false
    12·2 answers
  • What task did the u.s. government undertake that many people identify as the birth of the internet
    5·2 answers
  • A forensics workstation consisting of a laptop computer with almost as many bays and peripherals as a stationary workstation is
    10·1 answer
  • Science is a body of knowledge that extends back to Select one: a. the time of Galileo. b. Italy in the 16th century. c. Greece
    6·1 answer
  • A company has its branches spread over five places in a state. It has become difficult for employees to transfer information and
    7·1 answer
  • What is Celeste? ( This is for my coding class )
    6·2 answers
  • क) मानौं तिमी बसेको समाजमा मान्छेहरूले सधै फोहर फाल्ने गर्नाले वातावरण प्रदूषित
    13·1 answer
  • Help me please I’m failing
    11·1 answer
  • What was the name of first computer?
    14·1 answer
  • A packet switch has 5 users, each offering packets at a rate of 10 packets per second. The average length of the packets is 1,02
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!