1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady_Fox [76]
3 years ago
15

What function should be entered into B7 to calculate the total budget

Computers and Technology
2 answers:
PSYCHO15rus [73]3 years ago
4 0

Answer:

=SUM(B3:B6)

Explanation:

KiRa [710]3 years ago
3 0

Answer:

Explanation:

In excel we have two options to calculate a total budget, for example, we're going to assume that we have 3 values A6, B6, C6, In this case, we can use this formula =A6+B6+C6 or =SUM(A6:C6), in both ways we're going to have the same result because this is a sum but with different formulas, even we can select specific rows, is not necessary to add range.

You might be interested in
What is the difference between referential and entity integrity
Lisa [10]

Answer:

Explanation:

Referential integrity is the state in which all values of all foreign keys are valid. Referential integrity is based on entity integrity . Entity integrity requires that each entity have a unique key.

Hope this helped and have a good day

3 0
2 years ago
Please help Ill give you brainliest if I get 2 answers. Which is used to input information on a laptop?
Ivanshal [37]

Answer:

c

Explanation:

7 0
3 years ago
Checking for and correcting errors may need to be done numerous during which of the following phases of the software development
qaws [65]

Answer: planning

Explanation:

3 0
3 years ago
Exceptions can be handled in all of these ways except:
KatRina [158]

Answer: A) Modular decomposition

Explanation: Modular decomposition is the composition of a graphs into small modules. These modules are the subset of the whole graphs and thus the part of the graph. These modules are these very design efficient and so they are not capable of handling the exceptions .They have precise representation which has modules which cannot seem to have exception because that will disturb the structure of the graph .

6 0
4 years ago
You decide to configure ntp on the router to get time ntp server with an ip address of 172.17.8.254 which commanda should you us
Morgarella [4.7K]
Telenet into the router, authenticate and type enable once the prompt is back type ntp server 172.17.8.254 do this on all routers.
4 0
3 years ago
Other questions:
  • What is PHP language
    12·1 answer
  • Which of the following information security technology is used for avoiding browser-based hacking?
    11·2 answers
  • Individuals with desirable traits will be __________ to have young that survive than individuals without these traits. (2 points
    5·2 answers
  • What is the communications activity of the Internet called
    15·1 answer
  • PLEASE HELP<br><br><br> i’m doing a internet safety brochure. what is a good hook ?!
    14·1 answer
  • Use unit analysis to determine the unit of measurement for the expression 10x + 25y​
    8·1 answer
  • Arrange the steps below to outline what maia needs to do to accomplish this task.​
    9·1 answer
  • In an URL what does the domain name describe?
    14·1 answer
  • What are some example of popular music for teenagers
    8·2 answers
  • When an EC2 instance is being modified to have more RAM, is this considered Scaling Up or Scaling Out?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!