1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
telo118 [61]
3 years ago
12

Ellen is expecting to get a 3% raise next year. She enters .03 in cell D2 so that she can predict her monthly income for the nex

t year. What function key will make D2 an absolute reference?
Computers and Technology
1 answer:
Korolek [52]3 years ago
3 0

Answer: F4

Explanation:

Absolute reference means that we can use a formula for a cell in a Excel and that formula for that particular cell will not be changed even if we copy or drag that formula to some part of the cell.

Excel offers us with the solution of applying formulas to different part of the cells which are indicated by the $ sign. So as in the question Ellen as she is expecting a 3% raise net year in her monthly column, So she can use absolute reference. She enters .03 which is 3 divided by 100 in the monthly income column. So in that column she has to type = for the formula to begin. Then the formula which is .03 and followed by F4 which is used to make the cell D2 absolute reference.

So next time upon referencing cell D2, we would get the value according to the formula.

You might be interested in
True or false? because you have made it a practice to never access the
Flauer [41]

Answer: False

Explanation: Even if the internet service is not connected with the operating system while accessing the database, it is still on risk and can be vulnerable to get attacked. Devices of the system like USB drive can happen to have the malware which creates the risk towards database.

The computer system can get invoked with the virus or other attack while the user connects the internet afterwards when he/she is not accessing the database, these malware get stored in system once they get invoked and corrupt the system and its database even when the internet connection is not present .Thus, the statement given is false.

6 0
3 years ago
The best defense against injection attacks is to
Sergeeva-Olga [200]
The best defense against injection attacks is to develop secure habits and adopt policies and procedures that minimize vulnerabilities. Staying aware of the types of attacks you're vulnerable to because of your programming languages, operating systems and database management systems is critical.
5 0
2 years ago
Did batman die in endgame? I dont have enough money to see the movie can you tell me what happens. It said batman died from some
kotykmax [81]

Answer: The Marvel batman, otherwise known as Iron Man did.

Explanation: Movie was pretty good.

5 0
3 years ago
What do you think that current household products that do not contain microprocessors will contain microprocessors in the next 2
DENIUS [597]

Answer:

Explanation:

Yes we could find microprocessors almost everything even in ourself because this technology revolution is stronger day to day, and smart thing is the future, there are smartphones, watch, even houses, nowadays there are houses and hotels with smart technology even in the curtains, with a voice command we can program activities like wash or clean, and all these products have microprocessors.

3 0
3 years ago
4:when a computer is on it is
Tanzania [10]

Answer:

c: running

Explanation:

when the computer is turned on The operating system keeps things organized in the background so that multiple programs can run at the same time

4 0
2 years ago
Other questions:
  • based on the transcript, what did broadcasting the story through the medium of radio allow welles to do?
    8·1 answer
  • To add text to a slide when using presentation software, you need to add a text box. To add a text box, click the Text Box butto
    6·2 answers
  • Determine the output of the following code segment:
    9·1 answer
  • Class CTRivers describes collection of CT rivers. It has no data, and it provides the following service methods. None of the met
    13·1 answer
  • Can you answer my question it's a bit confusing to me! I'm adding brainlist too!
    8·1 answer
  • Help with this robotics hw pls
    5·1 answer
  • What is most important for you to choose before you build a network?
    6·1 answer
  • HOW TO DISCONNECT A MONITOR FROM A SYSTEM UNIT
    6·1 answer
  • The web design teams of a company are working on designing websites for various companies, Pick the ideas that employ proper use
    13·1 answer
  • Instructions
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!