1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
3 years ago
9

What formula would be used to add two cells together after the equal sign?

Computers and Technology
2 answers:
kondor19780726 [428]3 years ago
6 0

Answer:

Column#Row#+Column#Row#  APEX Verified

Explanation:

katen-ka-za [31]3 years ago
3 0
The answer is <span>column#row+column#column#row#</span>
You might be interested in
What is a trojan horse in computer science?
Firdavs [7]

Answer:

type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

Explanation its malware

4 0
3 years ago
Write code which takes a user input of a String and an integer. The code should print each letter of the String the number of ti
il63 [147K]

import java.util.*;

public class myClass {

public static void main(String args[]) {

Scanner scan = new Scanner(System.in);

System.out.print("Input a String: ");

String str = scan.nextLine();

System.out.print("Input an integer: ");

int num = scan.nextInt();

for(int i=str.length()-1; i>=0; i--) {

for(int j=0; j<num; j++) {

System.out.print(str.charAt(i));

}

}

}

}

8 0
3 years ago
Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers.
eimsori [14]

Answer:

HURRY

Dr. Khan works for the marketing department of a company that manufactures mechanical toy dogs. Dr. Khan has been asked to assess the effectiveness of a new advertising campaign that is designed to be most persuasive to people with a certain personality profile. She brought four groups of participants to the lab to watch the video advertisements and to measure the likelihood that they would purchase the toy, both before and after watching the ad. The results of Dr. Khan’s study are presented below.

Part A

Explain how each of the following concepts applies to Dr. Khan’s research.

Survey

Dependent variable

Big Five theory of personality

Part B

Explain the limitations of Dr. Khan’s study based on the research method used.

Explain what Dr. Khan’s research hypothesis most likely was.

Part C

Use the graph to answer the following questions.

How did the trait of agreeableness affect how people responded to the new ad campaign?

How did the trait of conscientiousness affect how people responded to the new ad campaign?

7 0
3 years ago
A ____ port is a connection in which eight data lines transmit an entire byte of data at one moment in time.​
harina [27]
A parallel port is a a connection in which eight data lines transmit an entire byte of data at one moment in time.
5 0
3 years ago
After you save a table, the new table name appears ____.
kobusy [5.1K]
Table1/2.....hope it helps
5 0
3 years ago
Read 2 more answers
Other questions:
  • You will use the _____
    15·2 answers
  • Which of these protects against the most common attacks on the internet via a database of signatures, but at the same time actua
    9·1 answer
  • In a typical e-mail address the host is
    14·1 answer
  • W t f is a ground fault circuit interrupter?
    6·2 answers
  • What Does S.T.E.M stand for?​
    8·1 answer
  • A section in a history book describing the conditions and causes of the Great Depression in the Midwest in the 1930s. a. Enterta
    15·1 answer
  • Write a calculate_sq_inches_of_good_pizza function that accepts the diameter of a pizza and returns the area of the pizza minus
    7·1 answer
  • Which statement best describes 'abstraction'? *
    5·1 answer
  • Which of the four factors of production are hit the hardest when high unemployment occurs ?
    10·1 answer
  • A hacker is trying to gain remote access to a company computer by trying brute force password attacks using a few common passwor
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!