1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eduardwww [97]
4 years ago
7

You type a complex formula in cell A20. You would like to make the same calculation in cells B20 through H20. To be efficient, y

ou should _____.
a. type the formula in B20 through H20


d. use the COUNT function


c. use autofill


d. use the ABS function
Computers and Technology
1 answer:
fomenos4 years ago
4 0

Answer:

Use autofill

Explanation:

In excel "autofill" is used to fill data in cells, which follows the pattern or logic applied in other cells. To apply same calculation of A20 in B20 to H20, we use autofill technique. Instead of copy pasting, or manually entering the complex formula this method is more suitable.  

You might be interested in
In the Combine Documents dialog box, you must select two different documents, ______.
Kruka [31]
Original and revised
5 0
3 years ago
What are four things to keep in mind when spotting a job scam?
Tomtit [17]
In general
Fast money easily
At home
Pay a fee for the job
They ask for credit card or other payment methods they don't need access to
8 0
4 years ago
Read 2 more answers
Software designed to penetrate security controls, identify valuable content, and then encrypt files and data in place in order t
rjkz [21]

Software designed to penetrate security controls, and to unlock the encryption is known as Ransomware .

<h3>What is Ransomware?</h3>

Ransomware is known to be a kind of malware set up or made to encrypt files on a device, and makes any files and the systems that rely on them to be unusable.

Note that Software designed to penetrate security controls, identify valuable content, and then encrypt files and data in place in order to extort payment for the key needed to unlock the encryption is known as Ransomware.

Learn  more about encryption from

brainly.com/question/9979590

#SPJ1

3 0
2 years ago
What is the value of the following?
Korvikt [17]

Answer:

ewn

patulong ka sa parents mo

7 0
3 years ago
Which program is commonly used to verify a new piece of hardware?
NeX [460]
<span>In the current software market, the most commonly used desktop operating systems fall into three groups: Microsoft Windows, Apple Mac OS, and Linux. Before upgrading the operating system, check the minimum hardware requirements of the new OS to ensure that it can be installed successfully on the computer. </span>
6 0
4 years ago
Other questions:
  • A web crawler uses a search _______ to traverse the web.​
    9·1 answer
  • Ron wants to install an energy efficient and long lasting device for lighting in his new home. Which device should he use?
    11·2 answers
  • Write a method called evenBeforeOdd that accepts an array of integers and rearranges its elements so that all even values appear
    15·1 answer
  • What is the function of napier's bones<br>​
    8·1 answer
  • A computer connected to the Internet that asks for data is a(n) ________. Select one: A. server B. client C. aggregator D. surro
    8·1 answer
  • A = 250; B = 325. which of the following statements is true? A ==B A&gt;B A =B
    12·1 answer
  • Which of these file types does not share info in a spreadsheet?
    15·1 answer
  • The study of the production and distribution of goods and services and their management is:
    6·1 answer
  • How do I mark brainlyist
    7·2 answers
  • A web site that contains large numbers of misspelled words and grammatical errors fails which of these general criteria?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!