1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erma4kov [3.2K]
3 years ago
5

write the cell address for the following 1. First row and first column 2.First column and last row. 3. 10th column and 19th row.

pls answer quickly​
Computers and Technology
1 answer:
fiasKO [112]3 years ago
4 0

Answer:

Row function returns the first-row number from the table array. address function takes the row_num & column_value as arguments and returns its absolute reference.  First Cell in UsedRange; Row: 2, Column: 2 Last Cell in UsedRange; Row: 5, Column: 6 First UsedCell in UsedRange. Syntax of “row” function: =row (reference) Example: =row (A1) would return 1 =row  would return 1 =ROW would return 1 index: The Index formula returns a value from the intersection between the row number and the column number in an Array.

Hope this helped you!

Explanation:

You might be interested in
What is a sensitive compartmented information program
Dahasolnce [82]

Answer:

cpu

Explanation:

4 0
3 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
AysviL [449]

Complete Question:

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Group of answer choices:

A. True.

B. False.

Answer:

A. True.

Explanation:

A proxy server is an example of non-security devices with security features because it acts as a hub or gateway between a user and the internet. Therefore, when a user request for resources through a website, the proxy server acts as an intermediary between them and the web server providing such resources.

ACL is an acronym for access control list and it comprises of rules that grant or deny access to resources on a network.

A firewall is a network security system which prevents unauthorized access on a private network by monitoring, controlling and filtering inbound and outbound network traffic (packets) based on a set of security rules.

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

<em>Hence, Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices. </em>

3 0
3 years ago
There is a feature that allows you to lock the document, to avoid others making changes. True or False
Burka [1]

Answer:

yes there is

Explanation:

6 0
3 years ago
Why do we install doorbells in our house
Vinil7 [7]

Explanation:

It's placed near the door. When a visitor presses the button, the bell rings inside alerting you that someone is at the door.

6 0
3 years ago
Read 2 more answers
How an operating system allocates system resources in a computer​
Whitepunk [10]

Answer:

The Operating System allocates resources when a program need them. When the program terminates, the resources are de-allocated, and allocated to other programs that need them

8 0
3 years ago
Other questions:
  • Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this
    5·1 answer
  • Is this statement true or false?
    12·2 answers
  • Live.com is Microsoft's free web-based email provider.<br> A. True<br> B. False
    6·1 answer
  • The traditional UNIX scheduler enforces an inverse relationship between priority numbers and priorities: the higher the numbe1~
    6·1 answer
  • PLEASE HELP I WILL GIVE YOU BRAINLILY
    15·2 answers
  • Nonverbal communication includes _____.
    9·2 answers
  • What is the code i need to do
    12·1 answer
  • What does this function do in the code?
    5·2 answers
  • How to give a brainiest on a question? if you teach me i will give brainiest
    7·2 answers
  • Maria needs to use a requirement-gathering method that will help her provide a set of questions to the client. Which method shou
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!