1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anarel [89]
3 years ago
12

What happens by default when you copy a formula from one cell to another cell?

Computers and Technology
1 answer:
natta225 [31]3 years ago
8 0
By default, all cell references are relative references. When copiedacross multiple cells, they change based on the relative position of rows and columns. For example, if you copy the formula =A1+B1 from row 1 to row 2, the formula will become =A2+B2.
You might be interested in
Lamp is an acronym for a complete solution of open source software that goes together to build a general purpose web server. whi
Westkost [7]
Answer choices?

LAMP contains <span>Linux, Apache, MySQL, and PHP.</span>
3 0
3 years ago
What skill would be easiest to learn from a simulation video game?
garik1379 [7]

Answer:

D

Explanation:

the first three you would need hands-on practice to learn.

5 0
3 years ago
Read 2 more answers
Source code is one particular representation of a software system. It highlights some details and hides others. This is a good e
grigory [225]

Answer:

Abstraction

Explanation:

Under fundamental principles of software engineering, the term "abstraction" is simply defined as the act of highlighting some details and hiding other ones.

Thus, the correct answer among the options is Abstraction.

8 0
3 years ago
Which of the following are associated with Public Key encryption? (Select all that apply.) Question 2 options: a) Asymmetric key
tatiyna

Answer:

A- ASYMMETRIC KEYS

Explanation:

Assymmetric keys are public keys that are use for encryption. They are public keys which may be disseminated or share widely, they are usually know by everyone. The keys come in pairs in which what one key encrypts, only the other can decrypt.

Asymmetric keys allows someone to send their public key in an open and insecure channel.

3 0
3 years ago
A computer that supports 10/100/1000 Ethernet allows for 10, 100, or 1000 ________ per second.
stich3 [128]

A Computer that supports 10/100/1000 Ethernet allows for 10,100,or 1000 gigabyte per second.

4 0
4 years ago
Other questions:
  • What the address for dns server that the eorkstation will use?
    10·1 answer
  • Which of the following is a good choice to help you stay organized when you are away from the office? A. Personal Information ma
    7·1 answer
  • Within the Differentiated Services (DiffServ) architecture, how many classes of service (CoS) are there?
    7·1 answer
  • Write a program that will ask the user to input a phrase (multiple word sentence), and an integer value. A static function will
    14·1 answer
  • True or false? pressing Ctrl and S is a shortcut for saving
    15·2 answers
  • Which of the following occurs during data cleansing?
    9·1 answer
  • ANo _____ works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling pr
    12·1 answer
  • What is the full form of USB​ ?
    15·1 answer
  • Consider a computer that uses 5 bits to represent positive integers and uses all 5 bits to represent the value.
    9·1 answer
  • Select the correct term to complete the sentence.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!