1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
3 years ago
8

The syntax used for referencing cells with their worksheet names is the sheet name, followed by ____, then the usual column lett

er and, finally, the row number.
Computers and Technology
1 answer:
Snezhnost [94]3 years ago
4 0

Answer:

Exclamation mark " ! "

Explanation:

Microsoft Excel is a spreadsheet application used for data analysis. It is used to analyze and represent data in statistical diagrams for easy comprehension. It has various tools and formulas.

It's workbook can contain several worksheets. The worksheet is made of cells located by a row and column. To locate and use a cell in another worksheet, the name of the worksheet followed by and exclamation mark and then the column alphabet and row number of the cell.

Eg: travel ! B9 ( where 'travel' is the worksheet name)

You might be interested in
Mary and Billy are moving away to college and both know in their hearts that they need to end their relationship. They move away
ivanzaharov [21]

In the case of Mary and Billy, the above is called Negotiated farewell.

<h3>What is Negotiated farewell?</h3>

In the case of  Negotiated Farewell, one can say that couples are knonw to jointly create the story of the end to what we say their marriage.

Note that Negotiated Farewell is one that is made for emotionally immature or any kind of combative people. hence, In the case of Mary and Billy, the above is called Negotiated farewell.

Learn more  about relationship from

brainly.com/question/10286547

#SPJ1

4 0
2 years ago
1. Which markup language adds the ability to use video without requiring the user to download add-ons?
aniked [119]

HTML5

HTML5 has fewer plug-ins like the ability to standardize how audio and video are presented on a Web page. It introduces the <video> element designed to remove the need to install 3rd party add-ons and plug-ins like adobe flash player. It also adds the <audio> element  too that allows pages to smoothly add audio files.

3 0
3 years ago
From the introductory conversation chip and anna shared, which elements mentioned might suggest the use of case tools?
kari74 [83]

CASE tools are used to boost analyst output, enhance user-analyst collaboration, and incorporate life cycle tasks.

Chip and Anna would communicate with one another and discuss parts of the design that they have finished using CASE tools.

Due to the enormous number of users in a system, CASE tools will help to simplify communication among all users and analysts, therefore this would be helpful to Chip and Anna as well.

They could also employ CASE tools to help them record the data they have obtained from questionnaires, interviews, and document analysis.

Learn more about tool:

brainly.com/question/25860017

#SPJ4

8 0
1 year ago
Write an expression that executes the loop body as long as the user enters a non-negative number. Note: If the submitted code ha
madam [21]

Answer:

           while (Num>=0) {

               System.out.println("enter a another number");

               Num = in.nextInt();

           }

Explanation:

The complete java code prompting a user to enter a number until a negative number is entered is given below:

import java.util.Scanner;

public class num6 {

public static void main (String [] args) {

Scanner in = new Scanner(System.in);

System.out.println("enter a number");

int Num = in.nextInt();

while (Num>=0) {

System.out.println("enter a another number");

Num = in.nextInt();

}

System.out.println("Done.");

return;

}

}

3 0
4 years ago
The key to security policy is being able to measure compliance against a set of controls. Security controls define _____ ______
Virty [35]

Answer:

The correct words for the blank spaces are: how; why.

Explanation:

In computer science, security control implies all the efforts of how organizations prevent, detect, and attack risks to safeguard sensitive information. Security policies establish why those actions are taken and set a list of all the assets that must be protected in front of a breach.

8 0
4 years ago
Other questions:
  • Write a MIPS program to generate the following series of integers: 1, 2, 3. 6, 9, 18. 27, 54. 81. If you are curious where this
    13·1 answer
  • What is basic statement made up of​
    10·2 answers
  • If a cheetah covers 155 meters in 5 seconds, at what speed is the cheetah running?
    14·2 answers
  • Where can information on metalworking occupations be found?
    14·2 answers
  • What is the process of copying items from ram to a storage device?
    8·1 answer
  • Encryption is the key to keeping your personal information secure online.<br><br> True<br><br> False
    11·1 answer
  • Need answer ASAP. I’ll mark brainliest if correct
    7·1 answer
  • What is a key differentiator of Conversational Artificial Intelligence (AI)
    11·1 answer
  • Which is the fastest memory in computer​
    9·2 answers
  • From Edmentum/Plato
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!