1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
3 years ago
5

How do Hlookup and Vlookup differ?

Computers and Technology
2 answers:
german3 years ago
6 0

HLOOKUP performs the same function as VLOOKUP, but looks up data that has been formatted by rows. HLOOKUP searches for a value in the top row of a table, and then returns a value in the same column from a row you specify in the table or array

tensa zangetsu [6.8K]3 years ago
4 0

This picture might answer it for you

You might be interested in
13. The Save As command is useful if you want to copy an open document and
Marina86 [1]
A. give the copy a new name
6 0
2 years ago
Read 2 more answers
Which can be used to create a poll on a web page? <br>CSS<br>HTML <br>JavaScript <br>Text editor​
NeX [460]

Answer:

HTML can be used to create a poll on a web page.

4 0
2 years ago
_____ is a function performed by control programs that manages computer resources, such as storage and memory.
Fudgin [204]
Resource allocation is a function performed by control programs that manages computer resources, such as storage and memory. It is necessary for any application to be run on the system because the computer is required to allocate certain resources for it to be able to run once the user opens any program.


5 0
3 years ago
Which component is a part of the central processing unit (CPU) of a computer
suter [353]
The arithmetic logic unit (ALU), which performs arithmetic and logical operations.

The control unit (CU), which extracts instructions from memory and decodes and executes them, calling on the ALU when necessary.

6 0
2 years ago
Read 2 more answers
What is the characteristics of a spear phishing message
Cerrena [4.2K]
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Define the method object inc_num_kids() for personinfo. inc_num_kids increments the member data num_kids. sample output for the
    11·1 answer
  • White arrows in the middle of the lane indicate whether the lane must __________.
    8·2 answers
  • After placing her insertion point after Grandma’s Kitchen, order the steps Danica needs to follow to insert and format the regis
    8·2 answers
  • 0001 0000 1100 0011 (unsigned, that is, interpreted as b2u)i.8 bit truncated value:ii.does the value change when truncated to 8
    7·1 answer
  • The level of competition is an important factor for many people when selecting a physical activity.
    7·2 answers
  • ________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
    12·1 answer
  • Select the correct answer from each drop-down menu.
    6·1 answer
  • 1. Which of the following is not related to a buffer overflow? A. Static buffer overflow B. Index error C. Canonicalization erro
    10·1 answer
  • What are advantages of using document templates?
    13·2 answers
  • RTOS stands for ______ Time Operating System.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!