1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
san4es73 [151]
3 years ago
12

What happens to formulas with relative cell references when they are copied using the fill handle?

Computers and Technology
1 answer:
Masteriza [31]3 years ago
4 0
The correct answer is D
You might be interested in
Consider a computer that has a number of registers such that the three registers R0 = 1500, R1 =4500, and R2 = 1000.
kobusy [5.1K]
(C) move 500 (Ro),r2
5 0
3 years ago
Specifically describe the design process for an Android phone application.
topjm [15]

Answer:

 The designing process of the various android applications is basically done by the XML and then, it is replaced by the HTML in the upcoming years. The XML is used as designing the front end applications in the android.

Wire-framing is the basic process of designing the various type of android applications and its is also called as creating the blueprint in the screen of android application.

The various step of designing the android phone application are as follow:

  • Firstly, define the actual reason of designing the app and then developed the app according to their actual requirement.
  • We must make a background research about the app so that we can innovate something new application to make this application more efficient and reliable.
  • Then, designing the app according the specific requirement and create the proper layout design. Then, build a proper prototype of the application.

7 0
3 years ago
Award documentation is typically required to be prepared and submitted within how long after the end of a project period:_____.
Stella [2.4K]

Award documentation is typically required to be prepared and submitted within how long after the end of a project period of 90 days.

What does Award includes?

  • Awards to international organizations and government institutions, whether or whether they are covered by SNAP, must include annual expenditure information.
  • The report shall be submitted for each budget period, if necessary on an annual basis, no later than 90 days following the end of the calendar quarter in which the budget period concluded.
  • The report must include information on any allowed extensions to the budgetary period. If more regular reporting is necessary, both the frequency and the deadline shall be stated in the NoA.

Learn more about the Post-Award Monitoring and Reporting with the help of the given link:

brainly.com/question/15415195

#SPJ4

5 0
1 year ago
A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file se
inysia [295]

Answer:

gpresult

Explanation:

Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.

Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.

There are various group policy commands such as;

  1. rstrui (System Restore tool will run),
  2. runas (using different permission to run a tool or program),
  3. tasklist (currently running programs are shown
  4. gpupdate (Group policies are refreshed)
  5. gpresult (group policy configurations are displayed for verification)

gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date

6 0
3 years ago
Where could an identity theft access your personal information
Nikolay [14]
Hello!

The identity theif could establish a new identity for ciminal purposes using YOUR identity and personal information, and the theif could aquire money or goods from it.

*PLAGIARISM FREE*
5 0
3 years ago
Read 2 more answers
Other questions:
  • What is the seventh byte in the roller coasters file?
    12·1 answer
  • In Word, blue underlining indicates which of these problems?
    12·1 answer
  • A server that provides data transfer and storage space at remote locations is called a
    7·1 answer
  • According to the ethical computer use policy, users should be __________ of the rules and, by agreeing to use the system on that
    11·1 answer
  • Of the sequences listed below, which shows the correct order of the steps in the incident management workflow: (1) authenticate
    14·1 answer
  • What is the best operating system
    12·1 answer
  • Mobile app designers who work for themselves are often dubbed _____.
    10·1 answer
  • Using direct mapping, consider a 16-bit memory addresses, and a cache with 64 blocks, where each block is 8 bytes. What is the s
    8·1 answer
  • Write an application that displays the strings in the provided array alphabetically in ascending order.
    9·1 answer
  • Set of general format used to write program in any programming language?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!