1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aalyn [17]
3 years ago
14

When enter a function or formula in a cell, which is the character you must type?

Computers and Technology
1 answer:
vladimir1956 [14]3 years ago
7 0
The answer is A. For instance, to use the sum function, you would need to =SUM()
You might be interested in
Vivek wants to save the data about his grocery store in a single table. Which among the following type of databases is used in t
Orlov [11]

Explanation:

A centralized database (sometimes abbreviated CDB) is a database that is located, stored, and maintained in a single location.

4 0
3 years ago
Your manager asks you to get details on a computer crash. What Windows Administration Tool could you use?
Law Incorporation [45]
  • The answer is "Option C" because the WMD is a freeware memory test software that works excellently.
  • It is a comprehensive math question, and it is also quite straightforward to use.
  • They suggest that you first test your ram with Memtest86, but you really should always test a second time with a different memory testing application to be certain.
  • Microsoft Windows Diagnostic is the second tool, that scans your laptop's physical memory & identifies any faults.
  • It requires a reboot to be used the system that will restart, and you'll be unable to your mouse in the Memory Diagnostic Tool.

The wrong choices can be defined as follows:

  • In option a, it is wrong because the data warehouse transforms data into information that may be used by an organization's decision-making process.
  • In option b, it is wrong because by using Metrics Collector Groups and logging the data, it was able to display real-time market data as well as collect and store data.
  • In option d, it is wrong because this is a tool used in Windows, which displays detailed information about major events that have taken place on your machine.
  • In option e, it is wrong because messages and trace logs could be viewed and sorted using the Log Viewer.

Learn more:

Memory Diagnostic: brainly.com/question/13606234

3 0
3 years ago
Read 2 more answers
Which of the following is not a characteristic of data that can strongly affect cluster analysis?
german

Answer:

c. Skewness

Explanation:

Cluster analysis involves analyzing a set of object by grouping the set of objects in such a way that objects in the one group or cluster are more similar  to each other than to those in other groups or clusters. The characteristics of data that can strongly affect cluster analysis includes the size, sparseness, scale, etc.

3 0
3 years ago
Why is Touchpad used in the laptop computer​
Ber [7]

Answer:

in controlling the mouse or cursor

Explanation:

as is it known tha a cursor is a poniting device. and the only way to control it without a mouse is the touchpad

3 0
3 years ago
Research three different distributions of Linux on the Internet. Record where you went to obtain your information. Compare and c
VARVARA [1.3K]

Answer:

The three Linux distributions are Arch Linux, Ubuntu and Fedora. In order to get more detailed information go to the wikipedia page of comparision of linux distributions.

Strengths and Features of these three are attached.

The two linux newsgroups are

1) Comp.os.linux.announce

2)comp.os.linux.networking

Explanation:

6 0
3 years ago
Other questions:
  • How many megabytes of data can a factory made audio cd hold?
    13·1 answer
  • ____, developed by xuejia lai and james massey, is a block cipher that operates on 64-bit blocks of plaintext.
    10·1 answer
  • A network technician cannot get a host to connect to the internet. running the ping command shows the apipa ip address. what is
    6·1 answer
  • Which are types of online resources that students can use for help? Check all that apply. simulated labs web-based educational g
    12·2 answers
  • Which of these is one of the primary concerns for protecting your family when online?
    9·2 answers
  • Security controls are measures taken to protect systems from attacks on the integrity, confidentiality, and availability of the
    12·1 answer
  • Consider the following program where the zu format specifier is used to display as an integer the result of sizeof. #include #in
    11·1 answer
  • Which type of computer is used to process large amount of data​
    15·2 answers
  • Designers are comparing performance between a multi-core processor equipped with 16 in-order cores and a dual-core superscalar p
    13·1 answer
  • Whats the flow in this code, and whats the risk that its creating and what can i do to fix it? (c language)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!