1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
3 years ago
9

When creating an input/output table, where do you enter the formula?

Computers and Technology
1 answer:
balu736 [363]3 years ago
4 0

When creating an input/output table, where do you enter the formula?  

A. In the input cell

B. In the output cell

C. In the title cell

D. In the table of contents


<u>ans. (B) In the output cell</u>

You might be interested in
What electronic devices do you use more frequently? And how much time do you use them?
seraphim [82]

Answer:

I’m assuming it’s a phone

Explanation:

I think it might be 6 to 5 hours but probably a lot more time depending on the person or age. I am guessing, but I think it could really depend on the persons parents or how much they have to be on their own phone.

6 0
2 years ago
when you enter a formula in a cell the result of the calculation displays in a cell. how do views of formula after entering it?
Digiron [165]
Idk I hope u find the correct answer
4 0
3 years ago
Read 2 more answers
Instructions:Select the correct answer.
Tju [1.3M]
E) Keep  top and left margins equal but larger than other margins
4 0
3 years ago
Read 2 more answers
The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
Rudiy27

Answer:

True

Explanation:

Computer security is basically divided into three main areas:

  1. Vulnerability/threat assessment and risk management refers to a process that requires the identification, quantification and ranking of a system's possible vulnerabilities.
  2. network intrusion detection and incident response refers to software that detects malicious activity or policy violations, and blocks them
  3. digital forensic investigation refers to the process of identifying, recovering and interpreting (or validating) electronic data.

Generally a single individual may specialize in one of these areas, that is why he/she may need help with the others.

8 0
4 years ago
Read 2 more answers
Which new jobs will be in demand in the next 20 years
s2008m [1.1K]
The answer is Data Jobs, Data Analysis, Solution Architecture, Software Engineering and Product Managers, there is many more but there's just a few. Hope I helped! :)
3 0
3 years ago
Other questions:
  • Given two int variables, i and j, which have been declared and initialized, and two other int variables, itemp and jtemp, which
    14·1 answer
  • 18. Which type of briefing is delivered to individual resources or crews who are assigned to operational tasks and/or work at or
    14·1 answer
  • how to create a program that prime number include arraylist , and if not print the prime factors of the number.
    13·1 answer
  • What are the considerations that go into representing information digitally? What are the trade-offs? What’s easy? What’s hard?
    13·1 answer
  • An additional factor in how an element is rendered is that properties are passed from a parent element to its children in a proc
    15·1 answer
  • You have a screen and a pen, which is an instance of the Turtle class.
    13·2 answers
  • Task 1: Alex has created the following code using Scratch and expected it to move backwards and forwards across the screen. Howe
    13·1 answer
  • Assume the following:
    10·1 answer
  • Subscribe to Markiplier
    15·2 answers
  • Which validation method would you use for first name on a data form
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!