1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Morgarella [4.7K]
3 years ago
10

Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?

Computers and Technology
1 answer:
Gre4nikov [31]3 years ago
8 0

Answer:

B Type an = sign in the cell, followed by the name of the function and the relevant arguments.

Explanation:

always look for =

You might be interested in
Of what is famous Ted Nelson?​
dsp73

Answer:

Nelson proposed a system where copying and linking any text excerpt, image or form was possible.

Explanation:

Ted Nelson is one of the theoretical pioneers of the world wide web who is best known for inventing the concept of hypertext and hypermedia in the 1960s. As one of the early theorists on how a networked world would work.

How I know:

I goggle it.

8 0
2 years ago
2) What are two reasons we analyze algorithms?
Likurg_2 [28]
It’s a making sections about what algorithms to use
8 0
2 years ago
Read 2 more answers
1. Explain the difference between a web browser and a search engine. (2 points)
Elan Coil [88]

Answer:

1. A browser is used to access websites and web pages whereas a search engine is used to search for particular information.

2. Indexing is the process by which search engines organise information before a search to enable super-fast responses to queries.

3.Search engines are used to find specialized data rapidly whereas web directory is used to find a list of different sites.

4. The working behind the PageRank algorithm is that a page with a large number of in- links(a link from an important page) to it, then its outgoing links to other pages also become important. It gives more importance to back links of a web page and propagates the ranking through links.

5. Look for Sites from Established Institutions 2. Look for Sites with Expertise 3. Steer Clear of Commercial Sites 4. Beware of Bias 5. Check the Date 6. Consider the Site's Look 7. Avoid Anonymous Authors 8. Check the Links

Explanation:

5 0
3 years ago
Please help!! I attached an image with the questions.
stira [4]

Answer:

why do you need help

Explanation:

yea

8 0
3 years ago
Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru
Alborosie

Answer:

D- Trojan Horse

Explanation:

Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.

Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.

3 0
2 years ago
Other questions:
  • The _____ establishes that the destination device is present on the network, verifies active service, and informs the destinatio
    13·1 answer
  • you just bought a new hard drive for your computer you plan to use this as a second hard drive to store all your you made files
    6·1 answer
  • Help please fast
    6·2 answers
  • Describe how one can change row and height
    6·1 answer
  • Converting raw data into a more meaningful form is called:
    6·1 answer
  • Write a program "addnumbers.c" where it takes as many arguments as the user includes as command line arguments and calculates th
    11·1 answer
  • Heres the last questions
    5·1 answer
  • If we ignore the audio data in a video file, a video file is just a collection of many individual frames (i.e., images). What is
    6·1 answer
  • Order the steps to use a logical argument as a rule type.
    15·2 answers
  • How do i stop my computer from automatically connecting to a wireless network
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!