1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
3 years ago
14

To create a formula in______, you would first click in one of the cells​

Computers and Technology
2 answers:
Pavlova-9 [17]3 years ago
5 0

Answer:excel

Explanation:

agasfer [191]3 years ago
3 0

Answer:

To create a formula in Excel  you would first click in one of the cells​

Explanation

Excel is basically calculator with advanced features. It allows the user to enter data in the form of rows and columns and enable to user to perform different kinds of calculation. It has built-in formulas and also certain conditional operation which makes the software to get the best out of it.

The user can also use the macro feature to write macro programs. Some of the common formula used are “Sum(Range), all the other basic operations like addition, multiplication, subtraction, etc.

You might be interested in
You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you us
NikAS [45]

Answer:

Task Scheduler

Explanation:

Task Scheduler allows you to automate tasks in Windows 10

7 0
3 years ago
I have some IT problem. Can I find a programmer here?
Jlenok [28]
If it's a hardware problem, find a mechanic or buy replacement parts.
If it's a software issue, someone ranked high on Brainky may know the programming language.
A handy hint is just to ask! If your question isn't answered, try elsewhere!
3 0
3 years ago
What is diffie-hellman most commonly used for?
Alex777 [14]
DH is an algorithm to derive a shared secret over an unsafe channel.

Both parties exchange public keys, and can join them together with their private keys to create the secret. An eavesdropper can see both public keys, but since he doesn't posess the private keys, cannot derive the same secret.

The secret can be used to subsequently encrypt communications with a symmetric algorithm.

TLS uses this approach.
6 0
3 years ago
A piece of self-replicating code embedded within another program is called a
Lorico [155]
I believe its a virus.
8 0
3 years ago
Martha is typing on her computer. What type of communication is this? A. human-to-human B. human-to-machine C. machine-to-human
WINSTONCH [101]

Answer:

Human-to-machine

Explanation:

It is a human typing into a machine.

I hope this helped <3

6 0
3 years ago
Other questions:
  • Esther has acquired an associate's degree in information technology and certifications in PageMaker and Illustrator. Which caree
    8·2 answers
  • The Next Einstein Initiative and the ________ Institute for Mathematical Sciences bring bright young learners and the best lectu
    7·1 answer
  • What is the term for the error caused when one end of an unshielded twisted-pair (UTP) cable is terminated in the T568A configur
    6·1 answer
  • Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (a
    14·1 answer
  • + Use for loop to print numbers from 100 to 10
    11·1 answer
  • You are splitting up all your apples equally between 3 people. which statement below will calculate how many apples will be left
    12·1 answer
  • ASAP BRAINLIEST!!!
    6·1 answer
  • PLS ANSWER ASAP!!!! <br><br> In three to five sentences, explain the function of utilities.
    13·1 answer
  • I will make you brainless Just answer this question!!
    9·1 answer
  • (09 MC)How can understanding your own personality improve your relationships with others?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!