1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eduardwww [97]
3 years ago
7

You type a complex formula in cell A20. You would like to make the same calculation in cells B20 through H20. To be efficient, y

ou should _____.
a. type the formula in B20 through H20


d. use the COUNT function


c. use autofill


d. use the ABS function
Computers and Technology
1 answer:
fomenos3 years ago
4 0

Answer:

Use autofill

Explanation:

In excel "autofill" is used to fill data in cells, which follows the pattern or logic applied in other cells. To apply same calculation of A20 in B20 to H20, we use autofill technique. Instead of copy pasting, or manually entering the complex formula this method is more suitable.  

You might be interested in
Jason is computer professional who has access to sensitive information. He shares this information with another organization in
Temka [501]

<em>Jason violated the </em><em>confidentiality of information. </em>

<em> </em>

<em>Part of information security is "confidentiality of information" wherein an employee must kept all the information he may acquire when he is working in a company, confidential. When we say confidential, he is not allowed to disclose anything that he may know about company's operation, sensitive information to anybody who is outside the company (like in the example, another organization). Because data that he might disclose may get on hands by company's competitors and it can be used against the company. They might steal ideas and strategies. </em>

4 0
2 years ago
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
Zepler [3.9K]

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

3 0
3 years ago
Read 2 more answers
PLEASE HELP WITH MY COMPUTER
qaws [65]

Answer:

try powering it off the turn it back on

Explanation:

5 0
2 years ago
Read 2 more answers
Kevin would like to ensure that his software runs on a platform that is able to expand and contract as needs change. Which one o
Reil [10]

A terminology which best describe Kevin's goal in terms of expansion and contraction as needs change is: A. Scalability.

<h3>What is scalability?</h3>

Scalability can be defined as a measure of the ability of a system to change (expansion or contraction) in performance and cost as a result of changes in demands of application and system processing, especially in a network architecture.

In this context, we can logically deduce that a terminology which best describe Kevin's goal in terms of expansion and contraction as needs change is scalability.

Read more on scalability here: brainly.com/question/14301721

#SPJ1

Complete Question:

Kevin would like to ensure that his software runs on a platform that is able to expand and contract as needs change.  Which one of the following terms best describes his goal? A. Scalability B. Elasticity C. Cost effectiveness D. Agility

8 0
1 year ago
A programmer is writing a program that is intended to be able to process large amounts of data. Which of the following considera
Dmitry [639]

Answer:

B. How many programming statements the program contains

Explanation:

If a program is intended to be able to process large amounts of data, then the ability of the program to process larger data sets is heavily affected by

  • execution time
  • size of memory the program requires
  • storage space the program requires as it runs.

The length of the statements the program contains does not much affect program performance.

8 0
2 years ago
Other questions:
  • What might the purpose be for a sata-style power connector on a motherboard?
    15·1 answer
  • To create a file in dos edit, type ____ at the command prompt to start dos edit, and then begin typing in the document window.
    8·1 answer
  • Complete the sentence about a focusing technique.
    7·1 answer
  • A text file has been transferred from a Windows system to a Unix system, leaving it with the wrong line termination. This mistak
    15·1 answer
  • The building blocks of coded language are called
    11·2 answers
  • The terms Apps and Applications can be used interchangeably about software installed
    8·1 answer
  • Question 1 of 10
    15·1 answer
  • What is Japanese tradition?
    8·2 answers
  • Which of the following is not an operating system a) boss b) window xp c) linux d) bindux​
    15·1 answer
  • Most of the energy we use originally came from:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!