1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
3 years ago
11

Which formula is properly constructed

Computers and Technology
1 answer:
kirill115 [55]3 years ago
7 0

Answer:

Option 4 is correct ,=(B2+C9)

Explanation:

In excel a formula starts with an equal sign followed by the expression.

In first option the formula is incorrect inside the brackets. where 4 is equating to bracket. In 2nd option opening and closing brackets are not same. First closing bracket is missing an opening bracket. In third option all the formula is correct except the part where # is used in formula. Hash tags cannot be used in formula as a value. Here in option D  B2 and C9 are cell in excel, whereas parentheses are only used for better readability.

You might be interested in
Fill in the blanks : To store 3 character a computer occupies...................bytes memory space​
wariber [46]

Answer:

Umm was there supposed to be a picture????

Explanation:

Hope you have a wonderful Christmas Eve time with your family!!❄️

5 0
3 years ago
Read 2 more answers
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
Alex_Xolod [135]

Answer:

eavesdropping

Explanation:

Eavesdropping is as an <em>electronic attack</em> where digital communications are intercepted by an individual whom they are not intended. This is done in two main ways: <em>Directly listening</em> to digital or analog voice communication or the <em>interception or sniffing</em> of data relating to any form of communication.

4 0
3 years ago
1. Do you agree that Facebook is the best social media platform to use for interpersonal communication? Why or why not?
anzhelika [568]
Nah I don't there is a BUNCH of creeps on Facebook so no!
4 0
3 years ago
Read 2 more answers
According to which virtue do you need to secure information by limiting computer access to authorized personnel only ?
nadya68 [22]

Confidentiality is a virtue which we need to secure information by limiting computer access to authorized personnel only. People trust us to keep their private matters private. Keeping that confidence is an important aspect of trust.  

8 0
3 years ago
Read 2 more answers
10. Question<br> What are the drawbacks of purchasing something online? Check all that apply.
max2010maxim [7]

Explanation:

1) the quality of purchased good may be low

2) there might me fraud and cheaters

3) it might be risky

4) we may not get our orders on time

7 0
2 years ago
Other questions:
  • Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the b
    14·1 answer
  • While a hard drive is running, even a slight bump against the computer may cause the
    9·2 answers
  • What is output by the following C# code segment?int temp;temp = 180;while ( temp != 80 ) {if ( temp &gt; 90 ) {Console.Write( "T
    7·1 answer
  • Will give brainliest!!<br> (Question 3)
    12·2 answers
  • What is application software? A computer language for accessing data in a database. A character string used to identify the loca
    10·1 answer
  • Describe how a web browser and web server work together to send a web page to a user
    8·1 answer
  • A reflexive pronoun is a pronoun
    6·1 answer
  • Which of these is the fastest transmission medium?
    11·2 answers
  • B) The company's chief financial officer recognizes the need for an upgrade to the smart watches, but does not understand why th
    8·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!