1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olya-2409 [2.1K]
3 years ago
14

IN MICROSOFT EXCEL YOU CAN UES FOMULA TO DIVIDE OR MULTIPLY WHAT IS THE CORRECT FORMULA TO CALCULATE 4*6

Computers and Technology
1 answer:
nexus9112 [7]3 years ago
8 0

You actually have the correct answer. An excel formula starts with = so your answer would be =4*6

You might be interested in
What are 6 subtopics on computer programming ?
lubasha [3.4K]

On the internet, I found

Research topics

Artificial Intelligence

Computing and Mathematics

Cybersecurity

Data Science and Machine Learning

Embedded Systems and IoT

Process Management

Hope this helped :T

3 0
3 years ago
Consider the following code: def tryIt(b): for i in range(len(b)): b[i] = b[i] + 100 #***********MAIN************ x = [] x = [56
WINSTONCH [101]

Answer: I took a high school robotics class when I was in 5th grade and I don't even understand your code there aren't any instructions other than <em>"</em><em><u>Consider</u></em><u>"</u> the following code you may want to improve your question

7 0
3 years ago
Try to crack the code:
ololo11 [35]

Answer:001101110010010100011011010110010011100100100000001100100100110001000010001101100100010100100000001101100100100001010001010101001101001010

Explanation:

i copied

3 0
2 years ago
Suppose you want to use an Internet cafe to login to your personal account on a bank web site, but you suspect that the computer
kupik [55]

Answer:

Copy and paste the needed information from text editor to clipboard then to the web browser.

Explanation:

The keylogging software is an application that can connect to the keyboard API through software APIs or could be kernel based or hypervisor based, JavaScript based etc, to capture keyboard events.

It records these events which makes this tool useful for attackers in networks. So long as the clipboard logging or screen logging does not accompany the keyboard loggers, data can be copied on clipboard and pasted to the target point.

8 0
3 years ago
There is no way to track your smartphone once you lost it, true or false?
Ymorist [56]
If you originally had a tracking device installed on a different device like find my iPhone, you can easily see where it is. If your phone is Android, Google has a system where you can search where's my phone, and if you have your email login into your phone, you can log in on Google and Google will show you where it is. 
6 0
3 years ago
Read 2 more answers
Other questions:
  • What natural boundary separated british territory from louisiana?
    7·1 answer
  • Computer Architecture
    7·1 answer
  • There are varying definitions for the term "dumb terminal," but it often refers to the fact that the terminal has
    13·1 answer
  • Choose two browsers and compare their security features.
    5·1 answer
  • Pls help me
    5·1 answer
  • 80. A .......... is used to read or write data.<br>A. CD B. VDU C. ROM D. RAM​
    6·1 answer
  • HELP ASAP, AND YES I KNOW, WRONG CATEGORY. SORRY!
    10·2 answers
  • You have a technical interview for a new position in digital media. One of the questions you are asked is this: “A client asks y
    13·1 answer
  • DEFINE Problem:
    11·1 answer
  • In order to view a page break what should you do
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!