1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
6

A(n) ____ circular reference occurs when a formula in a cell refers to another cell or cells that include a formula that refers

back to the original cell.
Computers and Technology
1 answer:
weeeeeb [17]3 years ago
8 0
Indirect is the correct answer. 
You might be interested in
what motivators should the action section of your sales message include? check all that apply. a satisfaction guarantee a proof
kogti [31]

The motivators that should be in the action section of your sales message include is option A and D:

  • A satisfaction guarantee
  • A deadline

<h3>What are sales motivators?</h3>

Sellers might be driven by: Bonuses, sales commissions, and salaries make up compensation. Products, trips, and more time off are incentives. Achievement includes being a high performer, finishing a project, and achieving objectives.

Note that A gift, an incentive, a time-limited offer, a deadline, or a satisfaction guarantee are all examples of potential motivators.

Therefore, Main motivation is simply doing a good job and getting the desired results. While I prefer working alone on my projects, I find that working in a team environment allows us to accomplish our objectives more quickly.


Learn more about motivators from

brainly.com/question/6853726
#SPJ1

5 0
1 year ago
How do you represent the decimal integer 50 in binary?
Colt1911 [192]
The answer is 110010 because the decimal number 50 can be expressed as 32 + 16 + 2.
3 0
3 years ago
Assume that strikeCounter has already been declared to be a "pointer to int". Assume further that strikeCounter has been initial
Feliz [49]

Answer:

int* strikeCounter ;

int someVal;

scanf("%d", &someVal);

strikeCounter =&someVal;

*strikeCounter =someVal*4;

Explanation:

Here we took one int variable and read that value from user. we assigned that int variable address to pointer variable "strikeCounter " and we are pointing the value of strikecounter as 4 times of that integer variable value

8 0
4 years ago
A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member
elena-s [515]

Answer:

Client To Site.

Explanation:

The Client-to-Site is a virtual private network which used to provide the connection of the device like a laptop to the organization network. In the Client To Site a single computer is connected to the remotely network, for all the purpose and the intent of the network.

The single laptop is connected with a remote machine in the firewall. The  "IPSec" protocol is used in the Client To Site connection.

3 0
3 years ago
To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
Zolol [24]

Answer: False

Explanation:

 The given statement is false, as the configuration of the firewall, operational and administration procedure must be documented.

The configuration of multiple firewall are identical and the integrity and also performance of the configuration firewall files are check on the regularly bases.

It is basically used to avoid the security leaks and the documentation errors so it is necessary that it should be check regularly so that it can easily implement without any interrupt occurrence.

8 0
3 years ago
Other questions:
  • You have been hired to set up a network for XYZ Enterprises. What factors will you consider to determine the type of network nee
    7·2 answers
  • When you select a state abbreviation from a combo box, how does the form control record your selection?
    8·1 answer
  • Methods used to change variables are called ______. equals accessors toString void mutators
    5·1 answer
  • The UML models operations by listing the operation name preceded by an access modifier. A(n) ________ indicates a public operati
    7·2 answers
  • Which statement best describes a transition in PowerPoint?
    12·1 answer
  • Write multiple if statements: If carYear is before 1967, print "Probably has few safety features." (without quotes). If after 19
    11·1 answer
  • Firewall ____ indicate whether a large number of echo messages are being received.
    9·1 answer
  • What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible
    11·1 answer
  • Will give BRAINLIEST, PLEASE HELP, WILL BE MUCH APPRECIATED
    13·1 answer
  • Which three characteristics help identify a business opportunity? (Choose three)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!