1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepan [7]
3 years ago
11

When you set up a worksheet, you should use cell references in formulas whenever possible, rather than ____ values.

Computers and Technology
1 answer:
vovangra [49]3 years ago
4 0

Answer:

Constant

Explanation:

One of the flexibility of worksheet is using cell references to get the value of a cell, this will make the overall formula update itself when cell values are changed, but when using a constant to make computation the formula is not keeping track of the contents of the cells for any change and this will make it a fresh work to get a value based on changed values.

You might be interested in
Jason Chang is creating photos of his restaurant for a new website. Some of the photos of the staff have red eye, others are bad
Nadusha1986 [10]

It is okay to modify photos digitally to improve their appearance as long as it doesn't show what they aren't producing.

<h3>What is Advertisement?</h3>

This is the act of persuading people to buy goods and services and is usually done with the aid of the media.

Pictures are usually taken which have to be in the best shape and quality in order to entice people to buy the goods thereby bringing about higher sales and profit for the company.

Read more about Advertisement here brainly.com/question/1020696

7 0
2 years ago
What is the QOS model?
Andre45 [30]

Answer:

Quality Of Service

Explanation:

Technology that manages data traffic to reduce packet loss, latency and jitter on the network. QoS controls and manages network resources by setting priorities for specific types of data on the network.

5 0
2 years ago
What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame?
juin [17]

Logical Link Control is the data link sublayer that identifies the network layer protocol encapsulated in the frame. The acronym of Logical Link Control is LLC.

Therefore, the answer is LLC.

7 0
3 years ago
A program written in a(n) procedural language consists of sequences of statements that manipulate data items. __________________
Alenkasestr [34]

Answer:

true.

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the statement is completely true. Procedural programming is a widely used paradigm that basically gives the program a set of routines or specifications, and the program mixes and matches them as they continuously repeat the process. It is used in many areas, including video game development.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

7 0
3 years ago
___ is an example of a calling statement.
Naddika [18.5K]

Answer:

printf("%f", roi(3, amt));

Explanation:

To call the function, we have to put the function name without return type and if the function have parameter then we have to pass the parameter without data type as well.

Let discuss the options:

Option A: float roi(int, double);

it is not a calling, it is used to declare the function. In calling, return type of the function like float and data type of the parameter does not pass like int, double.

Option B: printf("%f", roi(3, amt));

print is used to display the result, inside the print it call the function. It is correct way to call the function.

Option C: float roi( int yrs, double rate);

it is not a calling, it is used to declare the function. In calling, return type of the function like float and data type of the parameter does not pass like int, double.

Option D: float roi( int yrs, double rate)

Same reason as option C.

Therefore, the option B is correct option.

4 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following is the strongest password? Xo795&amp;A &amp;cGo9Tz F5h#3u9g vU7#$3T sC9$d&amp;cF5h#3u9g
    13·2 answers
  • Will give brainliest!!!!!!!!!!!!
    6·2 answers
  • What will happen if Sam goes to the View menu, clicks Toolbars, and then clicks Picture?
    12·2 answers
  • Given the strings s1 and s2 that are of the same length, create a new string consisting of the first character of s1 followed by
    12·1 answer
  • How did punch cards improve the weaving process?
    11·1 answer
  • You've been given a network of 130.0.0.0 /16. you need to divide it into four VLSM subnets as follows:
    8·1 answer
  • Assessment
    12·1 answer
  • What refers to a collection of small sections of code that are stored together to solve many everyday programs?
    11·2 answers
  • Which of the following is considered true regarding modern work environments?
    9·1 answer
  • Greg is concerned about the use of ddos attack tools against his organization, so he purchased a mitigation service from his isp
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!