1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sav [38]
4 years ago
9

Barat explains that if you have a cell that is the sales price of a given product, the value of which will change to produce the

desired Solver result in the target cell, this cell is what kind of cell?
Computers and Technology
1 answer:
Mice21 [21]4 years ago
4 0

Answer Choices:

a.goal cell

b.constraint

c.changing cell

d.absolute cell

Answer:

c.changing cell

You might be interested in
Which group contains the command to manually conduct a spell check ?
charle [14.2K]

Answer:To check spelling in a Word document, open up the document, head to the “Review” tab, then click on “Spelling & Grammar” (part of the “Proofing” group of tools). Then a window will appear showing the first word the program believes to be misspelled. Click through the options to review the whole document.

Explanation:Hope this helped u out btw can i plz have brainlist only if u wanna give me brainlist though have an great day kind sir or ma'am!

8 0
3 years ago
While performing maintenance work on the components of a computer, you feel a small electric shock. Before you began working, yo
Colt1911 [192]
Static electricity could have build up because of your clothes
6 0
4 years ago
Which example best demonstrates an impact of computers on health care?
Dennis_Churaev [7]
B-Robotic surgery allows surgeons to make smaller incisions.

Explaination: Anything having to do with medical procedures are healthcare so this is my reasoning.
4 0
3 years ago
Read 2 more answers
100 POINTS!!!!!!!
bogdanovich [222]

A)

<u>~</u><u>Intellectual property needs to be protected because it usually has</u><u> </u><u>psychological</u><u> </u><u>value.</u>

Hope this helped you- have a good day bro cya)

4 0
3 years ago
Read 2 more answers
What threat do insiders with authorized access to information or information systems pose
ki77a [65]

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

7 0
3 years ago
Other questions:
  • Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a s
    12·1 answer
  • Write a program with a function that accepts a string as an argument and returns a copy of the string with the first character o
    11·1 answer
  • A comma is also called a statement terminator. A. True B. False
    8·1 answer
  • Which kind of file would be hurt most by lossy compression algorithm
    8·2 answers
  • Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t
    14·1 answer
  • You can view information for the individual people who will perform the tasks on theproject in the
    7·1 answer
  • Which task should happen during the planning stage of a project? reflect on the project outcomes prevent set-backs determine the
    11·1 answer
  • Alright, so I have a wireless mouse that uses a dongle (it's not Bluetooth nor wired). But recently I realized that none of the
    12·1 answer
  • What is the way to discover requirments for software projects ?
    14·1 answer
  • While creating a digital portfolio, Harry wants to add documents that authenticate his skills, experience, and knowledge in digi
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!