1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
abruzzese [7]
3 years ago
7

In Microsoft Excel, you have data to enter in cells A1 through A250. You need a function that adds all of these cells together.

What is one way to write formula to achieve this?
Computers and Technology
1 answer:
UkoKoshka [18]3 years ago
6 0

Answer:

So you have to highlight all the cells that you want to sum up then click Insert Then SUM.

Explanation:

You might be interested in
Is downloading like installing?
Igoryamba
Downloading is another word for installing
8 0
3 years ago
What is the most significant issue that needs to be addressed when ensuring the proper functioning of a computer?
ycow [4]

Answer:

The most significant issue addressed while ensuring the proper functionality of computer is the working of Operating System.

Explanation:

There are many issues faced while making the computer properly functional. Such as, Memory size, processor speed, software installation etc. while operating system not working properly can cause a significant problem. If operating system is not working properly, the user is unable to use the computer.

So, to make sure the functioning of computer, the significant issue that should be needed to address is Operating System Installation.

7 0
3 years ago
What does the hexadecimal number 2D represent in the binary system?
Ber [7]
Every digit of a hex number is converted to 4 binary digits.
hex digits are { 0, 1, 2, .., A, B, .., F }.

2 in hex is equal to 0010 in binary.
D is equal to 1101.

so the answer is 00101101 or C.


8 0
3 years ago
You are required to justify the need to implement a three-tier campus network. Which justification below makes sense for a three
Murrr4er [49]

Answer:

Correct answer is (d) Scalable solution for an enterprise environment

Explanation:

Scaling and enterprise simply means adding up resources to the business need. By adding hardware (s) or by upgrading the existing hardware without changing much of the application, one will be able to implement a three-tier campus network.

8 0
3 years ago
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
ra1l [238]

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

8 0
4 years ago
Other questions:
  • What is the legal right granted to all authors and artists that gives them sole ownership and use of their words, software, pict
    9·2 answers
  • Who can effectively use website authoring software?
    6·1 answer
  • How many unique ip addresses can be made in a fixed-length ip address system using 6 bits?
    8·1 answer
  • The 2 main types of copyright relevant to the recording industry?
    5·2 answers
  • Define an organizational unit in your own words.
    11·1 answer
  • Space management is a<br> driving method.<br> A. lazy<br> B. defensive<br> C. fast
    14·1 answer
  • Who knows coding questions? Please help! Thanks.
    6·1 answer
  • What is c also write it's features
    8·2 answers
  • In this program you will read in the number of seconds and convert it to days, hours, minutes and remaining seconds.
    8·1 answer
  • You do not have to move your fingers to click the top row reach keys.<br> 1. True <br> 2. False
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!