1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
3 years ago
7

What is a cell in computers

Computers and Technology
2 answers:
Marina CMI [18]3 years ago
8 0

Answer:

A cell is the intersection between a row and a column on a spreadsheet that starts with cell A1. ... Each cell in a spreadsheet can contain any value that can be called using a relative cell reference or called upon using a formula.

dusya [7]3 years ago
4 0
Jdhdndndmmekdidndnnxmxndnwnsnd
You might be interested in
Which sentence best describes a lifestream?
Law Incorporation [45]
Hoi!

The correct answer is "A lifestream is a time ordered stream of documents that acts as a user's online diary."

Lifestreaming documents and shares daily moments of someone's online life. :)
6 0
3 years ago
Read 2 more answers
A(n) ____ is an entry in a cell that contains text such as "2016 Sales" or "Travel Expenses."
slavikrds [6]

Answer:

B- label

Explanation:

A label is an entry such as a text within a cell that describes particular rows and columns. Labels are usually found at the top of the particular row/column they are identifying.

Hence, the texts "2016 Sales" and "Travel Expenses" are labels that identify cells such as the values of the sales in 2016 of a company and expenses spent on travel in a year of a family.

6 0
4 years ago
Cost, time, knowledge are examples of
Katena32 [7]
They are examples of constraints.
8 0
3 years ago
How do I cite a website?
Mila [183]

Last, First M. “Article Title.”Website Title. Website Publisher, Date Month Year Published. Web. Date Month Year Accessed.


3 0
4 years ago
Read 2 more answers
What is the name of the "local user" account involved in the alleged actions (Hint: where in the file structure did you find the
Sunny_sXe [5.5K]

I will assume this is a windows computer

Answer:

  • Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
  • You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.

Explanation:

The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.

Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.

8 0
3 years ago
Other questions:
  • If you use the ___ template, as opposed to a formatted theme, you must make all design decisions?
    15·1 answer
  • When typing in a cell, hitting Tab will bring which result?
    12·2 answers
  • Internet-filtering software that electronically blocks out websites in specific rating categories is called _____________ by tho
    9·1 answer
  • Modify your solution to Problem 8.24 so that one (and only one) child installs a Segmentation-fault handler which prints an erro
    10·1 answer
  • Differences between Quality of Services and a Service of Quality approach
    9·1 answer
  • Money from a Coverdell Education Savings Account can be used for:
    11·1 answer
  • What is the function of ctrl+f​
    15·2 answers
  • How many dog breed are there
    9·2 answers
  • What’s GIGO<br> Please write it in full form
    15·1 answer
  • Does any one know how to do addition of binary numbers​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!