1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darya [45]
3 years ago
12

Where should you click to edit an existing formula?

Computers and Technology
2 answers:
kkurt [141]3 years ago
7 0

Answer:

option c  "in the formula bar"

Explanation:

user100 [1]3 years ago
3 0

Answer:

You can edit the existing formula by clicking the cell in which formula is referenced, then edit the formula in the formula bar. (option c is correct)

Explanation:

This question is about how to edit the existing formula. In Excel, you can edit the formula. First, you have to click the cell in which the formula is written. Then you have to edit it in the formula bar. However, if you know and remember the formula, you can edit directly in the cell. But the best practice is to edit the formula in the formula bar.

Why other options are not correct.

  • In a cell that is referenced in the formula:

The cell that is referenced in the formula does not affect the formula. Because to edit something in the referenced cell, does not guarantee to affect the formula that you want to edit. To edit the existing formula, you click the cell in which formula is written, then edit it in the formula bar.

  • In the first blank cell of the worksheet

It is not necessary, that there would be a formula in the first cell. But, if there is a formula in the first cell, you should edit the formula directly in the formula bar.

  • In the status bar

You can't edit the existing formula in the status bar because the status bar is used for showing the status of actions you are doing in excel. The status bar is shown at the bottom of the excel sheet.

You might be interested in
A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications.
lakkis [162]

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

5 0
2 years ago
In PowerPoint, a type of chart that, rather than showing numerical data, illustrates a relationship or logical flow between diff
Lynna [10]

Answer:

A. SmartArt

Explanation:

SmartArt is a graphical tool used to visually communicate information.

8 0
3 years ago
Please help! I don’t know the answer to it :( it’s Fashion marketing
Oxana [17]

Answer:

I believe the answer should be C)

Sorry if it’s wrong,but hope it helps

8 0
2 years ago
The recelver in a communication exchange can always ellminate all barriers to the communication.
gogolik [260]
It’s false because I know it
3 0
3 years ago
What is the purpose of an IP address? A. identifying source and destination of data B. creating images on websites C. drawing ta
natka813 [3]

Answer:

The Answer is A. I could be wrong though.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which type of footwear should be worn while working on a hybrid vehicle?
    8·2 answers
  • All of the following activities may infect your computer with a virus EXCEPT ________.
    6·1 answer
  • My mac book airs touch pad stopped working and i can't click. what do i do?
    5·2 answers
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    9·1 answer
  • What is the name of the technology that integrates vast data bases with georeferenced data in order to design, plan, and manage
    5·1 answer
  • What is the definition of posture<br>​
    7·1 answer
  • Write a program that accepts a positive integer N as command-line argument, and outputs True if N is the square of some integer,
    13·1 answer
  • How does the Problem-solving Process help us to solve everyday Problems?
    13·1 answer
  • if anyone is on a Chromebook, do you ever mean to press backspace, then you accidentally press the power button and think "OH CR
    11·2 answers
  • How to create create a database in mysql using clv files
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!