1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MariettaO [177]
3 years ago
11

What is a what if analysis in Excel example?

Computers and Technology
1 answer:
Sergio039 [100]3 years ago
4 0

Answer:

What-If Analysis in Excel allows you to try out different values (scenarios) for formulas. The following example helps you master what-if analysis quickly and easily.

Assume you own a book store and have 100 books in storage. You sell a certain % for the highest price of $50 and a certain % for the lower price of $20.

(i really hope this is what u needed)

You might be interested in
If you want to start a convo go here<br> https://padlet.com/beighbay000/x0q2v6qrm46j
Setler [38]

Answer:

ok

Explanation:

thx for tha points

..........

6 0
3 years ago
What does it mean to “declare a variable”? create a variable use a variable share a variable modify a variable
lara [203]

You are defining the variable

6 0
3 years ago
Read 2 more answers
Margie has found a stock template to use. She changes a few things about the formatting and then saves the
asambeis [7]

Answer:

file open my documents

Explanation:

because if she saved it she would have to go to her documents to open it

6 0
3 years ago
Read 2 more answers
Wap to input a number and reserve it using while loop​
OlgaM077 [116]
Yes ok I get your questions
3 0
3 years ago
A rootkit uses a directed broadcast to create a flood of network traffic for the victim computer.a. Trueb. False
Lady_Fox [76]

Answer:

The following statement is False.

Explanation:

The following statement is not true because the rootkit is an application that provides unauthorized access to the computer or any program and it is the software that is intended to harm the computer system. So, that's why the rootkit is not used to create a flood of the network traffic in the user's system.

6 0
3 years ago
Other questions:
  • What is an (CR) Optical character recognition?
    13·2 answers
  • Discuss OPENGL instruction to draw the following drawing primatives:
    14·1 answer
  • 5255555555555+55555555555555/1111*99442
    14·2 answers
  • Assume that sentence is a variable of type String that has been assigned a value. Assume furthermore that this value is a String
    10·1 answer
  • Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp
    11·1 answer
  • What are entity-relationship diagrams and how are they used? What symbol is used for a relationship? What is an associative enti
    5·1 answer
  • Question 21 pts How many lines should an email signature be? Group of answer choices "5 to 6" "7 to 8" "1 to 2" "3 to 4"
    10·1 answer
  • Can some one give me a april fools joke i can do to my teacher
    12·1 answer
  • Write common ICT tools​
    5·1 answer
  • a client device on your network is trying to authenticate via radius proxy, but is failing. you check the relevant policy on the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!