1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weeeeeb [17]
3 years ago
15

Which of the following options correctly represent a formula with Absolute References?

Computers and Technology
2 answers:
ludmilkaskok [199]3 years ago
4 0

Answer:

D.)=($A$1-$B$1)

Explanation:

The $ sign placed in between the characters of a cell makes the cell an absolute reference in any formula that involves the cell.

For example, the function "=A1 - $B$2" would give a result equivalent to "=A1 - B2" however, a drag down of the formula would result in a change of the function A1 to A2, A3, A4, A5...

Hence from the options, =($A$1-$B$1) is the only formula with absolute references.

lakkis [162]3 years ago
3 0
The answer is D =(<span>$A$1-$B$1) 

sources:just took the test</span>
You might be interested in
¿cuales son la diferencias de programacion estructurada y programacion orientada a objetos?
Arturiano [62]

Answer:

La programación estructurada está diseñada para enfocarse en el proceso / estructura lógica y luego en los datos requeridos para ese proceso. La programación orientada a objetos está diseñada para centrarse en los datos. ... La programación orientada a objetos admite herencia, encapsulación, abstracción, polimorfismo

Explanation:

5 0
4 years ago
Identify the components of the enveloped virus budding process
Elina [12.6K]

The components of the enveloped virus budding process are:

  • lipid bilayers
  • fission event
  • Glycosylated (trans-) membrane proteins.

<h3>What is the case of the virus about?</h3>

Virus budding in general is known to be a term that connote the scattering or disturbance of a cellular membrane and it is one away from the cytoplasm.

Note that it is said to be the envelopment of the viral capsid and this is done by one or more lipid bilayers that can be seen in the viral membrane glycoproteins, and it is one where a fission event takes place.

Hence The components of the enveloped virus budding process are:

  • lipid bilayers
  • fission event
  • Glycosylated (trans-) membrane proteins.

Learn more about virus from

brainly.com/question/26128220

#SPJ1

3 0
2 years ago
What is pseudocode? O A way of describing a set of instructions in text form using plain english O A diagrammatic representation
Marat540 [252]

The definition of pseudocode is that; A: A way of describing a set of instructions in text form using plain English

<h3>What is Pseudocode? </h3>

In computer science, pseudocode is defined as a plain language description of the steps in an algorithm or another system.

Now, the way Pseudocode works is that it often makes use of structural conventions of a normal programming language to be utilized for human reading instead of machine reading.

Pseudocode usually omits details that are essential for machine understanding of the algorithm, such as variable declarations and language-specific code.

Read more about Pseudocode at; brainly.com/question/11623795

8 0
3 years ago
What is the definition of a performance, such as a poetry reading? O A. A work of art installed in public OB. A presentation of
Anvisha [2.4K]

Answer:

(B) A presentation of creative works.

Explanation:

Because performing is similar to presenting and poetry is similar to free writing, or creative words.

3 0
3 years ago
What is the name for the size and style of text?
Mashcka [7]

Answer:

Font

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • What is the purpose of requirements gathering
    9·2 answers
  • Consider whether there are additional components that could be added to the IPv4 protocol to enhance its usefulness. What are th
    15·1 answer
  • The _________ indicates the number of elements, or values, an array can hold
    14·1 answer
  • Which state legislation requires companies to report security breaches within 48 hours
    6·1 answer
  • What is the name used for the camera’s view from a single position?
    9·1 answer
  • What might a designer need to consider when choosing an appropriate energy source for products and power systems
    15·1 answer
  • What code would you use to create the login button?
    11·1 answer
  • The sequence of instructions performed to execute one program instruction
    12·1 answer
  • Question 7 of 25
    10·1 answer
  • A museum is evaluating historical documents for authenticity, reviewing their physical condition, and categorizing them by subje
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!