1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
11

cell d1 contains the value 7.877 you want cell d1 to display this value as 7.9 how can you accomplish

Computers and Technology
1 answer:
Georgia [21]3 years ago
6 0

Answer:

You round?

Explanation:

You might be interested in
A previously saved labels report can be accessed from the
Tcecarenko [31]

C. is the answer to that question

6 0
3 years ago
On which tab are the print commands in Excel 2016 accessed?
galina1969 [7]

Answer:

file (backstage)

Explanation:

edginuity 2020

3 0
3 years ago
Read 2 more answers
Source ________ contains instructions written by a programmer specifying the actions to be performed by computer software.
konstantin123 [22]

Source code contains instructions written by a programmer specifying the actions to be performed by computer softwa

7 0
3 years ago
What is a distinguishing feature of 5G mm Wave?
RoseWind [281]

Answer: 5G high bands (mmWave, also referred to as FR2) are found in the range of 24GHz to 40GHz. They deliver large quantities of spectrum and capacity over the shortest distances

4 0
3 years ago
Communication among office computers is based on a protocol that uses CRC-32 for error detection. A series of 100 identical test
Fiesta28 [93]
I think it is the CRC-32 for error detection
4 0
3 years ago
Other questions:
  • If you write a toString method to display the contents of an object, object1, for a class, Class1, then the following two statem
    14·1 answer
  • One purpose of the dual ignition system on an aircraft engine is to provide for?
    7·2 answers
  • A switch is a central network device that connects network nodes such as workstations and servers in a physical ____ topology
    14·1 answer
  • What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
    7·1 answer
  • Why should you not perform any personal grooming task while driving?
    5·2 answers
  • Who distributes IP Address?
    10·1 answer
  • Someone say crackhead
    15·2 answers
  • The full meaning of ENIAC,ABACUS,EDVAC,EDSAC<br>and explain ​
    7·1 answer
  • 4.2 Lesson Practice​
    8·2 answers
  • A software copyright?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!