1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harrizon [31]
4 years ago
9

Click cell C6 in the Data worksheet and insert a column. Type Series Name in cell C6. Click cell C7 in the Data worksheet and in

sert a lookup function that identifies the series code, compares it to the series legend, and then returns the name of the series. Copy the function you entered from cell C7 to the range C8:C22. Change the width of column C to 18.
I put in a VLOOKUP function and all I get back is #N/A.
Computers and Technology
1 answer:
Rudiy274 years ago
7 0

Answer:

right click cell C6 then insert entire column.

Type "Series Name"

Insert function to C7 = VLOOKUP (B7,$A$2:$B$4,2,FALSE)

Copy through C22

Select the range then select format and column width to change the width to 18.

You might be interested in
Jin needs to add a row into his spreadsheet, but he does not want to remove any existing data. Which combination of options shou
disa [49]

Answer:

b. insert > entire row

5 0
3 years ago
Read 2 more answers
Select the correct answer. Which of these is a function of the marketing team of a game development studio? A. creating art elem
Alexus [3.1K]

Answer:

C. testing

Explanation:

4 0
4 years ago
Read 2 more answers
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
navik [9.2K]

Answer:

False

Explanation:

The Security Development Life Cycle (SDLC), is a software development which involves traditional approach towards its design such as, waterfall model, Agile, etc.

It can either be referred to as a generic secure development life cycle or a specific one, such as the Microsoft SDL or the Cisco SDL.

Its phases includes,

A1 - Security Assessment

A2 - Architecture

A3 - Design and Development 1

A4 - Design and Development 2

A5 - Ship

PRSA - Post Release

Each phase talks about how a secured software is developed.

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. This statement is false because by definition and attributes Security Development Life Cycle is a traditional approach towards software development and not a general method.

6 0
3 years ago
The term _____ best describes the level of technology skills needed in today’s business world.A: computer knowledgeB: computer f
Alja [10]

Answer:

The answer is "Option B"

Explanation:

The ability to learn and use basic computer hardware and software understanding to solve problems and to access information is known as computer fluency. and other options are not correct, that can be defined as follows:

  • In option A, computer knowledge is a basic general awareness, that helps the user to use the computer more fluently, that's why it is not correct.
  • In option C, It is an internal feature of the computer, that helps to transfer data, that's why it is not correct.
  • In option D, computer information is also known as data that is stored in the computer, that's why it is not correct.
6 0
3 years ago
How can I use HTML to express a personal value
Mama L [17]

Answer: Order list

Explanation:

7 0
2 years ago
Other questions:
  • Monica needs a printer to use at home. She wants fine-quality prints at an affordable cost. Which printer will help her achieve
    9·1 answer
  • Which part of the cpu stores instructions for high speed access or processing
    14·1 answer
  • Despite its vivid design, the website for Lolly's Bookstore did not seem to attract customers who lingered. In fact, most websit
    13·1 answer
  • How has technology influenced space exploration?
    13·1 answer
  • PLEASE HELP
    14·2 answers
  • Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data
    13·1 answer
  • 2. Which Interface uses
    7·1 answer
  • You send a friend a private message about something personal that is going on with you. Without permission, she forwards your te
    10·1 answer
  • I really need help in this!!!
    11·1 answer
  • 15. Question
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!