1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
3 years ago
9

Suppose cell C5 contains the formula =B$6+C1. Match each formula with its respective cell if you copied it.

Computers and Technology
1 answer:
zheka24 [161]3 years ago
8 0

Answer:

The options are not being given. However, we can place the $ sign in front of letter or number we make it constant across the rows or across the columns. By $B we mean, the column will remain same as B as we move across the rows down or up, and by $6 we mean the row will remain fixed to 6 as you move right or left of the cell where you place $6.

Thus, B$6 + C1,will change to below as you move down:

B$6 + C2

B$6 + C3

B$6 + C5

...... and so on.

and if we move left, it will become:

C$6 +D6

D$6 +E6

E$6 +F6

.........and so on.

Please keep an eye on the letter and number, the way they change in each condition, like if its B the next is C irrespective of columns where the next column starts.

Explanation:

The answer is self explanatory.

You might be interested in
Which operating system is a version of Linux?​
Lunna [17]

Answer:

MS-DOS

Explanation:

The only operating system which is a version of Linux.

3 0
3 years ago
Play-e-ball, a company that creates games for gaming consoles, gathers data from the information systems of its partners, suppli
ad-work [718]

Answer:

Option B

Explanation:

It is the perfect example of BI(Business Intelligence).

7 0
3 years ago
There are many opportunities for unscrupulous people to break information system security. Of the five components in an informat
7nadin3 [17]

The answer is letter e.

People is the component poses the very large ongoing security risk. It also can be a threat to the safety. People play an essential part in most operational systems and methods. Information, ability and mental outlook often determine the feature and quantity of system output. Just as a stereo requires the right component, high-performance business systems require the right fit of people to work.


8 0
3 years ago
Read 2 more answers
Change the Towers of Hanoi program so that it does the following: a)Counts the number of ring moves and prints that - instead of
aniked [119]

Answer:

Following are the program in the Java Programming Language.

//import scanner class package

import java.util.Scanner;

//define class

public class Tower_of_Hanoi {

//define static integer variable

public static int count = 0;

//define function

public static void Permute_Arrange(int n, char x, char ax, char to) {

//set if statement

if (n == 1) {

//increament in count by 1

++count;

}

//otherwise  

else  

{

Permute_Arrange(n - 1, x, to, ax);

++count;

Permute_Arrange(n - 1, ax, x, to);

}

}

//define main function

public static void main(String[] args)  

{

//set scanner type object

Scanner sc = new Scanner(System.in);

//print message

System.out.println("Enter less than 0 to exit");

//set the while infinite loop

while(true)

{

//print message

System.out.print("Enter the number of Disks: ");

//get input from the user

int num_of_disk = sc.nextInt();

//set the if statement to break the loop

if(num_of_disk<0)

{

//exit from the loop

System.exit(0);

}

//call the function

Permute_Arrange(num_of_disk, 'A', 'B', 'C');

//print message with output

System.out.println("Total number of Disc Moves is: " + count);

count = 0;

}

}

}

<u>Output:</u>

Enter less than 0 to exit

Enter the number of Disks: 4

Total number of Disc Moves is: 15

Enter the number of Disks: 7

Total number of Disc Moves is: 127

Enter the number of Disks: -1

Explanation:

Here, we define a class named "Tower_of_Hanoi"

  • Set the integer data type static variable "count" and initialize the value to 0.
  • Define void data type static function "Permute_Arrange" and pass three characters type arguments "x", "ax", and to and one integer type argument "n", inside it we set if condition to increment in the count variable otherwise call the function.
  • Finally, we define the main function to get input from the user and pass the argument list in function and call the function.
8 0
4 years ago
Which one of the secondary storage types below would be best if you wanted to edit files and re-save them to secondary storage?
jenyasd209 [6]
USB drive
the cloud
google docs
google drive
7 0
3 years ago
Other questions:
  • #Imagine you're writing a program to check if a person is
    8·1 answer
  • Why do most people share, especially photos online using social media?
    11·2 answers
  • 61. Select an activity of the Production Phase: a. a web authoring tool is often used b. the graphics, web pages, and other comp
    10·1 answer
  • The best-known communications protocol is probably smtp, which regulates internet data transport. _________________________
    6·1 answer
  • rite a program that prompts the user to enter an integer and displays each of its numbers one by one.
    9·1 answer
  • If a menu-driven program uses a loop to redisplay the menu after a selected operation has been performed, the menu should probab
    14·1 answer
  • Of the following choices what was the best thing to do with electronic equipment you no longer want
    7·1 answer
  • Police officers conducting traffic stops on minority drivers more than non-minority drivers is an example of what?
    8·1 answer
  • How do i delete peoples comments
    14·2 answers
  • Discuss why it is important to know the history of social media​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!