1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
5

Which sign or symbol will you use to lock cells for absolute cell reference

Computers and Technology
1 answer:
denis-greek [22]3 years ago
7 0

Answer:

Dollar ($) is used to lock cells for absolute cell reference.

Explanation:

There is two type of referencing in MS Excel. Relative reference and absolute reference. These are used for copying formula to other cells.

<u>Relative reference</u>

If we want to keep change the formula in the for different cell while copying in different cells we use relative reference.

For example

we want to add value of A1 and B1 and store it into C1. We want to copy this formula into next rows by changing the cell reference as in C2=A2+B2, C3=A3 + B3, we use relative referencing. There we just copy the formula to C2, C3 and so on, the formula remains same but cell references will changed.

<u>absolute reference</u>

If We want to to copy same formula with same cell references into different cells, we use look cell formula using absolute reference. We just put the $ sign before cell reference, it will make that cell absolute. Now where we copy and paste that cell the formula and references remains same.

<u>For Example </u>

we want to add two values of A1 and B1 into C1. we use C1=A1+B1. To make this cell absolute, we use $ sign as, C1= A$1 + B$1. Now this cell becomes absolute. Now if we want to copy the formula in C2, so C2= A$1 + B$1.

There cell is different bu in both cells formula and cell references are same.

<u></u>

You might be interested in
1. Write a program to input four numbers and store them in variables.
slega [8]
Honestly , brainly may seem like a place to get answers but it’s not , people come here to troll, like me
7 0
3 years ago
Assume that name and age have been declared suitably for storing names (like "abdullah", "alexandra" and "zoe") and ages respect
schepotkina [342]

Answer:

Explanation:

It is assumed that name and age have been declared suitably for storing names and ages. so the following is the code to read in a name  and age and printout the message "the age of name is age. "

cin >> Name;

cin >> Age;

cout << "The age of " << Name << " is " << Age << ".";

7 0
3 years ago
BitTorrent, a P2P protocol for file distribution, depends on a centralized resource allocation mechanism through which peers are
ch4aika [34]

Answer:

yes. it is true. mark as brainlest

8 0
2 years ago
Quick!!!!!
Vlad [161]

Answer:

B. the current affairs page

Explanation:

it's a simple question

8 0
3 years ago
Read 2 more answers
A popular photo editing application provides customers with the option of accessing a web based version through a monthly subscr
Black_prince [1.1K]

Answer:

photoshop app that purchase with a lower price 3$ per month

6 0
2 years ago
Other questions:
  • 9. The best way to insert an existing Excel chart into a document is to A. use the Object command. B. click the Insert tab and c
    6·2 answers
  • _____ is when network managers deal with network breakdowns and immediate problems instead of performing tasks according to a we
    9·1 answer
  • Which is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often dama
    14·1 answer
  • Which guidelines should be used to make formatting tasks more efficient?
    15·2 answers
  • Almost immediately after a server migration project, employees are complaining that they can't reach the Internet. You sit down
    8·1 answer
  • According to company policy and administrator must logically keep the Human Resources department separated from the Accounting d
    5·1 answer
  • To specify your preferred colors, fonts, and effects for a document, which of the following should be done?
    5·2 answers
  • There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side,
    15·1 answer
  • Create a basic program that accomplishes the following requirements: Allows the user to input 2 number , a starting number x and
    12·1 answer
  • Which statement correctly differentiates how to use list and table styles?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!