1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
myrzilka [38]
3 years ago
6

Which sign or symbol will you use to lock cells for absolute cell reference?

Computers and Technology
2 answers:
ivanzaharov [21]3 years ago
7 0
It's asterisk hope this helped
Zolol [24]3 years ago
4 0

Answer:

The symbol used is the $ sign. Example of the formula =E3/$E$1

DOLLAR SIGN its correct :)

You might be interested in
Organizations following Waterfall methodology usually begin with requirements gathering, in which the development team attempts
Aleks04 [339]

Answer:

Project teams do smaller portions of the entire project in small sprints.

Teams can interact to handle different steps simultaneously if needed.

Documentation is still required to keep everybody on track. This documentation allows teams to keep control over what version of the project they are working on and how the project has changed along the way.

As an approach to rapid development, the focus is on development rather than planning, enabling teams to start work more quickly.

hope this helps you

:)

7 0
3 years ago
Suppose the following sequence of bits arrives over a link:
Lera25 [3.4K]

Answer:

ok

Explanation:

4 0
3 years ago
Consider your lab assignment when reviewing the following code that will be placed in the CopyingJeroo class: public void atFlow
Mice21 [21]

Answer:

The image would be created on the second island and removed from the first island.

3 0
4 years ago
What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another
mihalych1998 [28]

Answer: the DNS server

Explanation:

4 0
3 years ago
Read 2 more answers
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as:
icang [17]
~Hello there! ^_^

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as..?

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as botnets.

Hope this helps~





3 0
4 years ago
Other questions:
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
    11·1 answer
  • While a hard drive is running, even a slight bump against the computer may cause the
    9·2 answers
  • When performing conflict management, it is important to identify your;
    6·1 answer
  • What is a expansion card for computer?
    5·1 answer
  • Now tell me how be rich like Bill Gates
    6·1 answer
  • In the code snippet, what is the “win” part called in programming?
    12·1 answer
  • Sam plans to use this image in artwork for a brochure about airplanes. Which principles of page layout is Sam planning to use in
    11·1 answer
  • A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in
    15·1 answer
  • Cuál es el objetivo principal de una clave primaria?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!