1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivolga24 [154]
3 years ago
8

what would be the address of the cell, which is intersect of the second row and third column in a worksheet

Computers and Technology
2 answers:
Aleksandr-060686 [28]3 years ago
6 0

Answer: <u>The address of the cell is </u><u>C2</u>

Explanation:

In a worksheet like Microsoft Excel, there are rows and columns. It tags rows with numbers and tags columns with alphabet letters. For example, the first row is 1, the second row is 2, the third row is 3, and so on. Similarly, the first column is A, the second column is B and so on.

We want to know the address for the intersect of the second row i.e. 2, and the third column i.e. C in a worksheet. In other words, it might intersect column C and row 2.

A cell is a box where a row and column intersect. The address of the cell starts with the column, and next there is the row. In that case, we can conclude that <u>the address of the cell is </u><u>C2</u><u>.</u>

podryga [215]3 years ago
5 0

C2 or B3. This is if you are talking about Microsoft Excel.

You might be interested in
A rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a P
Zanzabum

Answer:

TRUE

Explanation:

A rootkit is a collection of computer software, typically malicious, that is designed to grant an unauthorized user access to a computer or certain programs. Once a rootkit is installed, it is easy to mask its presence, so an attacker can maintain privileged access while remaining undetected.

Rootkit detection is difficult because a rootkit maybe able to subvert the software that is intended to find it.

Rootkits work by using a process called modification (the changing of user account permissions and security).

Rootkits are not malware themselves, but rather a process used to deploy malware on a target.

Therefore, it is TRUE that a rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a PC without the knowledge or consent of a user.

3 0
3 years ago
Write a program that include a method that returns the sum of all the elements of a Linked List of Integers. Allow the user to e
Illusion [34]

Answer:

static void Main(string[] args)

       {

           //declare a blank linked list

           LinkedList<int> numList = new LinkedList<int>();

           Console.WriteLine("Enter the Numbers");

           //check if the size of the linkedlist is 10

           while(numList.Count < 10)

           {

               //read the input supplied by the user

               string val = Console.ReadLine();

               //check if the input is integer

               if(int.TryParse(val, out _) == false)

               {

                   //if not integer, display error message and prompt for new number

                   Console.WriteLine("Invalid number");

                   continue;

               }

               //add the inputted number to the linkedlist

               numList.AddLast(int.Parse(val));

               

           }

           //call the method for linkedlist sum and display it

           Console.WriteLine(SumLinkedList(numList));

           Console.Read();

       }

       //method for linkedlist summation

       private static int SumLinkedList(LinkedList<int> val)

       {

           //declare sum as zero

           int sum = 0;

           //loop through the linkedlist to display the num and sum all numbers

           foreach(int item in val)

           {

               Console.Write(item + " ");

               sum += item;

           }

           return sum;

       }

   }

Explanation:

program written with c#

8 0
3 years ago
If a student is looking for the degree symbol (°) and it is not found on the main drop-down of symbols, what should the student
monitta
The student should attempt to hold down the alt key, then enter 248 on the number pad and then release the alt key. Like so: °
5 0
3 years ago
Read 2 more answers
Select the correct answer from the drop-down menu.
Eva8 [605]

Answer:

1. diagraph

2.analog

maybe

3 0
2 years ago
Activity
ch4aika [34]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about creating a table using a spreadsheet program to record how many t-shirt each team member sold.

The spreadsheet file is attached.    

Download xlsx
3 0
3 years ago
Other questions:
  • ___________ is an unsecured client server application / protocol that transfers files between two computers.
    11·1 answer
  • A web application starts when a client sends _______ to a server?
    13·1 answer
  • What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?]
    10·1 answer
  • Which type of operating system requires a keyboard in order to issue commands?
    13·1 answer
  • Light travels at 3 × 108 meters per second. A light-year is the distance a light beam travels in one year.Write a PYTHON program
    14·1 answer
  • Writе thе dеclaration of a doublе pointеr namеd avеragе
    10·1 answer
  • How to bypass a Lightspeed and Rocket Filter blocked website without being a admin and without downloading extensions? Must incl
    15·1 answer
  • A program that doesn’t work properly needs to be debugged. true or false
    8·1 answer
  • If you need some one to talk to you can talk to me
    13·2 answers
  • How is kerning used in Word?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!