1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Burka [1]
4 years ago
8

Pick the correct statements regarding cell references.

Computers and Technology
2 answers:
shusha [124]4 years ago
7 0

Statement two and three is correct.

Statement 1 is incorrect. A relative reference changes when a formula is copied to another cell while Absolute references remain constant. However, it is safe to say that an absolute address can be preceded by a $ sign before both the row and the column values. It is designated by the addition of a dollar sign either before the column reference, the row reference, or both. Statement C is also correct. A mixed reference is a combination of relative and absolute reference and the formula (= A1 + $B$2) is an example of a mixed cell reference.

Lady_Fox [76]4 years ago
3 0

Answer:

<em>1)</em><em> A relative reference will retain its references when copied to another cell.</em>

<em>2) An absolute address has a $ sign before both the row and the column values.</em>

<em>3) </em><em>= A1 + $B$2 is an example of a mixed cell reference.</em>

<em>4) </em><em>The address 7B is invalid.</em>

Explanation:

<em>We know that a call by reference method can be defined as a method of providing different  arguments to a function and then that function copies the address of an argument into the formal pattern.</em>

You might be interested in
Which type of hazzard are those substances which threathen you physical safety ?​
vovikov84 [41]

Answer:

98o

Explanation:

4 0
3 years ago
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
ra1l [238]

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

8 0
4 years ago
Which of the following is a job description for a person with a degree in Information Technology? radiology engineer web develop
Jet001 [13]

Answer: Web developer

Explanation: Web developer is a job where you have to develop World Wide Web applications by programming or applications that run over the internet, and this degree would need a degree in information technology

The other degrees needed for the following jobs:

1.    Radiology engineer: Radiology is a study of diagnosing and treating diseases with the help of medical imaging. So, it needs a degree in medical combined with physics and chemistry.

2.    Toxicologist broadcast technician: is a job where the technician has to determine the factors which contributed to a person’s death. So, a person should have a degree in medicine to become a toxicologist technician

6 0
3 years ago
1. What are copyright laws? (6 points)
Serggg [28]

Can u pls help me. srry i had to ask u on here lol

8 0
3 years ago
Which of the following steps should you take after attending a college fair?
leonid [27]

D. Make a decision about which colleges to attend that night.

5 0
3 years ago
Read 2 more answers
Other questions:
  • A _________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached
    15·2 answers
  • What is the purpose of a decision support system?
    13·1 answer
  • Discuss how and why video game hardware affects game design and where you think the next generation of platforms will change tho
    9·1 answer
  • This toolbar has icons representing the application's basic operations such as Save and Copy. Drawing Formatting Standard Task
    11·2 answers
  • "someone has tampered with your computer and erased data". what kind of computer threat is this
    11·1 answer
  • Which of the following is the java comparison operator for "not equal to"
    10·1 answer
  • Teachers in most school districts are paid on a schedule that provides a salary based on their number of years of teaching exper
    7·1 answer
  • In MMF2, what does the * symbol mean?
    5·1 answer
  • Gta? 5 or gta 4? orrrr gta 3? what do you think?
    11·2 answers
  • El planeamiento estratégico de una empresa es​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!