1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Greeley [361]
3 years ago
7

Create a cell reference in a formula by typing in the cell name or

Computers and Technology
2 answers:
lesya [120]3 years ago
5 0

1 Click the cell in which you want to enter the formula.

2 In the formula bar , type = (equal sign) and the formula you want to use.

3 Click the tab for the worksheet to be referenced.

4 Select the cell or range of cells to be referenced.

MARK ME BRAINLIEST PLEASE!!!!!!!!!

34kurt3 years ago
4 0

Answer:

D. clicking the row where the cell is located

You might be interested in
LIST THE 7 BEST COMPUTER SCIENCE MOVIES.
Serggg [28]

The Pirates of Silicon Valley.

Tron

Hackers

Antitrust

The Social Network

The Internship

The Imitation Game

5 0
3 years ago
How are special characters added to a Word document? Check all that apply.
MrRissso [65]

It kinda depends on what you mean by special characters

7 0
3 years ago
Read 2 more answers
An example of a(n) ____ reconnaissance attack is a user who sends SQL injections to a system in hopes of generating some type of
Elden [556K]
The answer to this question is A
7 0
3 years ago
Read 2 more answers
Which of the following Office Online apps is most effective for creating spreadsheets?
navik [9.2K]
The answer is C Excel. Excel allows you to make spreadsheets.

Hope this helps :-)
4 0
3 years ago
Read 2 more answers
A security specialist discovers a malicious script on a computer. The script is set to execute if the administrator's account be
levacccp [35]

The security specialist has discovers a malicious script on a computer known as a logic bomb.

<h3>Is logic bomb a type of malware?</h3>

A logic bomb is known to be a form of a malicious program that is set up or ignited if a logical condition is met, such as after a series of transactions have been done, or on a given date.

Therefore, The security specialist has discovers a malicious script on a computer known as a logic bomb.

Learn more about malware from

brainly.com/question/399317

#SPJ1

7 0
2 years ago
Other questions:
  • . SQL is a(n) _____ language.
    8·1 answer
  • _______________________ is a short-term program, typically 30 hours long, in which a therapist, social worker, or trained probat
    5·1 answer
  • How do you fix peer answer bad gateway 502. Please help
    7·1 answer
  • A project manager is responsible for (check all that apply)
    13·1 answer
  • What is the central idea of the second section:
    14·1 answer
  • Help me please! (*18* points!)
    5·1 answer
  • Paul is a baker who wants to improve his recipe for muffins because they turn out with a greasy flavor. What ingredient should h
    14·1 answer
  • Another word for asking a question of your data is to _____ it.
    6·1 answer
  • What is the best example of personally identifiable information.
    8·1 answer
  • Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!