1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLEGan [10]
3 years ago
9

The mathematical order of operations is used in Excel when formulas are evaluated. This order of operations states the order to

be
A. multiplication and division, exponentiation, addition and subtraction.
B. addition and subtraction, multiplication and division, exponentiation.
C. multiplication and division, addition and subtraction, exponentiation.
D. exponentiation, multiplication and division, addition and subtraction.
Computers and Technology
2 answers:
Sergio [31]3 years ago
6 0
The mathematical order of operations is used in Excel when formulas are evaluated. This order of operations states the order to be <span>exponentiation, multiplication and division, addition and subtraction.</span>
san4es73 [151]3 years ago
3 0
The answer is d. I hope this helps you and computers/technology is no joke.
You might be interested in
Quick time and flash are two examples of what product
zheka24 [161]

there apps .........

8 0
3 years ago
The following memo does not follow the correct format. What should be changed? To: Stacy, Allen, and Emma Date: August 12, 2012
miss Akunina [59]
<span>The From: line should appear under the To: line.

</span>
4 0
3 years ago
Read 2 more answers
What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number o
marishachu [46]

The subnet mask can be utilized to segment the 172.16.0.0 network to qualify for a minimum of 6 subnets while maximizing the numeral of broadcasters per subnet is 255.255.224.0

<h3>What do subnet masks mean?</h3>
  • A subnet mask is a 32-bit numeral formed by setting keeper bits to all 0s and developing network times to all 1s.
  • In this way, the subnet mask divides the IP speech into the network and host addresses.
  • A subnet mask is used to separate an IP address into two pieces. One element defines the host (computer), and the different part identifies the network to which it belongs.
  • To better comprehend how IP lessons and subnet masks work, look at an IP speech and see how it's managed.

To learn more about  subnet mask, refer to:

brainly.com/question/3234986

#SPJ4

5 0
2 years ago
On mad max ps4, why does the v6 sound beter and healthier than the v8
nadya68 [22]
Um is that a question?

5 0
3 years ago
How is ict integrated into marketing<br>​
Aleks04 [339]

Answer: The utilize of great ICT moreover moves forward client administrations and client request. From database advancement, site plan to showcase investigate, interpretation program, coordinate mail showcasing and preparing, the application of ICT is basic for a financial victory. The web is one of the ways in which media companies / businesses publicize.

Explanation:

5 0
2 years ago
Other questions:
  • If a storm is 7.5 kilometers away, how much time is expected between observations of lightning and thunder? Round your answer to
    10·1 answer
  • A(n ____ is a named group of formatting characteristics.
    7·1 answer
  • Badin Industries runs a web application that processes e-commerce orders and handles credit card transactions. As such, it is su
    9·2 answers
  • Baking Cookies. Sweet Dough Inc. bakes cookies—a popular dessert—based on the quantities ordered by their customers. Three raw m
    12·1 answer
  • Which button should be utilized if a user is unsure whether or not they are the right person to reply to an email?
    6·2 answers
  • Each sentence in the paragraph below has a number. Choose the number of two sentences that are in the wrong order in this story.
    14·1 answer
  • Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?
    11·1 answer
  • 8.11 LAB: Filter and sort a list
    8·1 answer
  • A person who creates a computer virus is a (1)system analyst (2) techician(3) programmer​
    11·2 answers
  • What is a word processing program? Give examples of word processing programs.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!