1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
3 years ago
9

When a formula contains the address of a cell, it is called a(n)

Computers and Technology
1 answer:
Shalnov [3]3 years ago
8 0
When a formula contains the address of a cell, it is called a c<span>ell reference.

hope this helps!</span>
You might be interested in
I. Given the following Java code fragment, what is output? int a, b; String c, d, e; String x = new String("I LOVE"); String y =
Levart [38]

Answer:

Output: The question segment gives the following output--

1) 6

2) 5

3) JAVA!  

4) i love

5) I LOVEjava!

Explanation:

  1. "1) 6" comes because "6" is the length of "I LOVE" which is the value of "x" variable and "x.length( )" statement gives the length of the value of "x" variable which is stored on "a" variable and "a" will be printed with "1)" symbol.
  2. "2) 5" comes because "5" is the length of "java!" which is the value of "y" variable and "y.length( )" statement gives the length of the value of "y" variable which is stored on "b" variable and "b" will be printed with "2)" symbol.
  3. "3) JAVA! " comes because "JAVA!" is the upper case letter of "java!" which is the value of "y" variable and "y.toUpperCase( )" statement change the value from lower case to uppercase of the value of "y" variable which is stored on "c" variable and "c" will be printed with "3)" symbol.
  4. "4) i love " comes because "i love" is the lower case letter of "I LOVE" which is the value of "x" variable and "x.toLowerCase( )" statement change the value from uppercase to lowercase of the value of "x" variable which is stored on "d" variable and "d" will be printed with "4)" symbol.
  5. "5) I LOVEjava! " comes because " I LOVEjava! " is the mixed value of the "x" and "y" variable. It prints because "x.concat(y);" statement combines the x and y value and stored in an "e" variable and "e" will be printed with "5)" symbol.
7 0
3 years ago
4
kupik [55]

Answer:

the answer is D Smart Object

5 0
3 years ago
Read 2 more answers
charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a
finlep [7]

Charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes and repairs security issues found. The kind of scanning that best describes Charles's requirements is: Active scanning.

<h3>Who is a Security Analyst?</h3>

A Security Analyst's responsibilities include the following:

Define, plan, execute, maintain, and improve security measures, policies, and controls. Writing reports and offering insights on the effectiveness of current security policies, incident response plans, disaster recovery plans, and other security-related information

Active scanning is a scanning approach that involves scanning individual endpoints in an IT network in order to retrieve more specific information.

Learn more about Security Analysts:
brainly.com/question/16354463
#SPJ1

6 0
1 year ago
Which approach is ideal for ensuring that a Webpage is maintained and does not appear neglected to users?
Greeley [361]

Answer:

D

Explanation:

I think putting hyperlink in essential pages is a good idea as it may guide a user

8 0
3 years ago
Technology can most broadly be defined as anything that does which of the following ?
Anastasy [175]
I would say A. Allowing us to improve efficiency in the workplace has helped grow our economy and we can thank technology for that. Due the it always improving our lives only get that much easier.
5 0
3 years ago
Other questions:
  • 1. How does inertia affect a person who is not wearing a seatbelt during a collision? 
    14·2 answers
  • Temporary storage location for cutting and pasting
    9·1 answer
  • The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals
    8·1 answer
  • Explain how the principles underlying agile methods lead to accelerated development and deployment of software.
    6·1 answer
  • Which of the following can be created when two tables contain a common field?
    14·1 answer
  • Making sure that your business has something special and distinct to offer is known as?
    12·1 answer
  • The process known as "bitmapping" is defined as information in _____. PLEASE HELP FAST
    11·1 answer
  • What game is this? help mee?
    8·2 answers
  • Whenever you press a key, click the mouse or start an application, you're sending instructions tow
    9·1 answer
  • Someone please make a random question with an easy answer because i need one more brainliest to UPGRADE!
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!