1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
3 years ago
14

Samuel wanted to paste the value and the formula attached from cell B6 to cell F16

Computers and Technology
2 answers:
yan [13]3 years ago
4 0

Answer:

B

C

E

Edgenuity

gtnhenbr [62]3 years ago
3 0

Answer:

See Explanation

Explanation:

Given

Source: B6

Location: F16

I'll list two methods which Samuel can use to achieve his goal

Take for instance, the formula in cell B6 is =SUM(B1:B5)

This style of referencing is called relative cell referencing

If Samuel copies and the pastes the formula like this =SUM(B1:B5), the cell name will be changed in the destination cell; meaning that he wont be able to retain the formula and value.

<em>Method 1: Using Absolute Cell Reference</em>

Sam will have to alter the formula in cell B6 to =SUM($B$1:$B$5)

With this, he has switched from relative reference to absolute reference;

Irrespective of the location Sam wants to paste the formula (as long as the formula is in the same work book), the formula and the value won't change.

So, the formula will still maintain its original text and value, when pasted in cell F16

<em>Method 2: Move The Formula</em>

Alternatively, Sam can move the formula from cell B6 to cell F16.

This can be achieved by

1. Select cell B6

2. Click on Cut on the home tab (or press Ctrl + X)

3. Select cell F16

4. Click on Paste on the home tab (or press Ctrl + V)

You might be interested in
Some architectures support the ‘memory indirect’ addressing mode. Below is an example. In this case, the register R2contains a p
egoroff_w [7]

Answer:

Following is given the solution to question I hope it will  make the concept easier!

Explanation:

7 0
3 years ago
What type of organism forms the base of food webs?
kotegsom [21]
A producer <span>forms the base of food webs</span>.
7 0
3 years ago
Synchronization barriers are a common paradigm in many parallel applications.
Bas_tet [7]

Answer:

I am not sure on this one I am guessing it is True

Explanation:

3 0
3 years ago
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have b
PilotLPTM [1.2K]

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>

8 0
3 years ago
T or F: Is there such thing as an OptiPlex 3020
eduard
T.
I hope this helps!
8 0
3 years ago
Other questions:
  • Help me out here pleaseeeee
    9·2 answers
  • Which method can help you prevent RSI while using a keyboard?
    14·1 answer
  • Which extension is appropriate for Word document templates?
    10·2 answers
  • _________ is a protocol used by e-mail clients to download e-mails to your computer. (
    6·1 answer
  • Which actions did Sheila have to take to make the changes observed? Check all that apply.
    9·1 answer
  • Keyboards that are widely used on various smartphones and other small portable devices, and which are designed primarily for com
    15·1 answer
  • The way that text and images are arranged on a slide is called _________. A. Layout B. Background C. Style D. Charting
    10·2 answers
  • The shell of a document that may be used over and over in desktop publishing is called a
    9·1 answer
  • Frrrrrrrrrrreeeeeeeeee brainliest for u
    13·2 answers
  • Jason Chang is creating photos of his restaurant for a new website. Some of the photos of the staff have red eye, others are bad
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!