1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
5

Which sign or symbol will you use to lock cells for absolute cell reference

Computers and Technology
1 answer:
denis-greek [22]3 years ago
7 0

Answer:

Dollar ($) is used to lock cells for absolute cell reference.

Explanation:

There is two type of referencing in MS Excel. Relative reference and absolute reference. These are used for copying formula to other cells.

<u>Relative reference</u>

If we want to keep change the formula in the for different cell while copying in different cells we use relative reference.

For example

we want to add value of A1 and B1 and store it into C1. We want to copy this formula into next rows by changing the cell reference as in C2=A2+B2, C3=A3 + B3, we use relative referencing. There we just copy the formula to C2, C3 and so on, the formula remains same but cell references will changed.

<u>absolute reference</u>

If We want to to copy same formula with same cell references into different cells, we use look cell formula using absolute reference. We just put the $ sign before cell reference, it will make that cell absolute. Now where we copy and paste that cell the formula and references remains same.

<u>For Example </u>

we want to add two values of A1 and B1 into C1. we use C1=A1+B1. To make this cell absolute, we use $ sign as, C1= A$1 + B$1. Now this cell becomes absolute. Now if we want to copy the formula in C2, so C2= A$1 + B$1.

There cell is different bu in both cells formula and cell references are same.

<u></u>

You might be interested in
The viewer of an OLAP report can change its format. Which term implies this capability?
amm1812

Answer:

The answer is "Option D".

Explanation:

OLAP reports stands for Online Analytical Processing reports, These reports provide a platform that behind many application use in Business Intelligence. and other options are incorrect that can be described as follows:

  • In option A, It is used to store the data into the OLAP report, that's why it is not correct.
  • In option B, It is software that is used for analytics data, that's why it is not correct.
  • In option C, It is used for finding index values in the 2D array that's why it is not correct.
3 0
3 years ago
Read 2 more answers
Write a C++ program that reads from the standard input and counts the number of times each word is seen. A word is a number of n
Rufina [12.5K]

Answer:

#include <stdio.h>

#include <string.h>

#include <ctype.h>

 

struct detail

{

   char word[20];

   int freq;

};

 

int update(struct detail [], const char [], int);

 

int main()

{

   struct detail s[10];

   char string[100], unit[20], c;

   int i = 0, freq = 0, j = 0, count = 0, num = 0;

 

   for (i = 0; i < 10; i++)

   {

      s[i].freq = 0;

   }

   printf("Enter string: ");

   i = 0;

   do

   {

       fflush(stdin);

       c = getchar();

       string[i++] = c;

 

   } while (c != '\n');

   string[i - 1] = '\0';

   printf("The string entered is: %s\n", string);

   for (i = 0; i < strlen(string); i++)

   {

       while (i < strlen(string) && string[i] != ' ' && isalnum(string[i]))

       {

           unit[j++] = string[i++];

       }

       if (j != 0)

       {

           unit[j] = '\0';

           count = update(s, unit, count);

           j = 0;

       }

   }

 

   printf("*****************\nWord\tFrequency\n*****************\n");

   for (i = 0; i < count; i++)

   {

       printf("%s\t   %d\n", s[i].word, s[i].freq);

       if (s[i].freq > 1)

       {

           num++;

       }

   }

   printf("The number of repeated words are %d.\n", num);

 

   return 0;

}

 

int update(struct detail s[], const char unit[], int count)

{

   int i;

 

   for (i = 0; i < count; i++)

   {

       if (strcmp(s[i].word, unit) == 0)

       {

           s[i].freq++;

 

           return count;

       }

   }

   /*If control reaches here, it means no match found in struct*/

   strcpy(s[count].word, unit);

   s[count].freq++;

 

   /*count represents the number of fields updated in array s*/

   return (count + 1);

}

4 0
3 years ago
In a food chain are living creatures that eat organisms from a diferente population?
marysya [2.9K]
I’m thinking predator? Or maybe consumer?
3 0
2 years ago
Read 2 more answers
What is a safe practice when online?
lisabon 2012 [21]

Answer:

Safe work practices are generally written methods outlining how to perform a task with minimum risk to people, equipment, materials, environment, and processes

Explanation:

6 0
3 years ago
. Linux servers are typically stored in a locked server closet to prevent physical access by unauthorized persons. Describe why
IrinaVladis [17]

Answer:

Following are the solution to this question:

Explanation:

Physical Access to Linux Servers:

Unauthorized staff is denied access to windows server due to various reasonable factors which might damage databases and then all database depends.

Linux distributions handle their servers but it is almost important that they will be protected or hackproof to safeguards their organizations' networks.

Guess if an unwanted staff has access to the server, he/she can be using the device by just placing a simple USB or dragging the information of the database to study it even further. Here that the results stay throughout the possession of even an unauthorized person, whom no organization wants to confront.

Its attacker may also damage that server by installing a virus or any virus mostly on the server. User security can allow unauthorized staff to go on a search and retrieve the database to disc inside the database.

Warranted physical limitations:

All such physical constraints are assured because the company cannot manage a minor error in physical security.

Because conflicts with both the physical limitation will damage its database so much but leave all loopholes free to that same protection of attackers and operators.

Its physical safety guarantee should be maintained by routine server room checks and ensure that every step of safety is undertaken and results are achieved.

6 0
3 years ago
Other questions:
  • Deon is required to provide the citation information for his sources. What type of information should he collect from his source
    10·2 answers
  • What is the difference between a key escrow and a recovery agent? (Choose all that apply.)
    12·1 answer
  • You recently upgraded your computer and added an extra 512 MB of RAM. Consequently, you want to increase your swap space by addi
    10·1 answer
  • The flynn effect best illustrates that the process of intelligence testing requires up-to-date ________
    14·1 answer
  • The color gradient is
    6·1 answer
  • You have just installed a SOHO router in a customer’s home and the owner has called you saying his son is complaining that Inter
    9·1 answer
  • Is greedy algorithm non deterministic by nature?
    13·1 answer
  • Fill in the blank with the correct response.
    10·1 answer
  • Which command os used to find a particular word in a document ?<br>​
    9·2 answers
  • For a certain company, the cost function for producing x items is C(x)=50x+100 and the revenue function for selling x items is R
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!