1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
3 years ago
13

Aubrey uses the following formula to calculate a required value. Which elements of the formula use mixed cell referencing?

Computers and Technology
2 answers:
slava [35]3 years ago
6 0

Answer:

$1A

Explanation:

I had the same exact question

iris [78.8K]3 years ago
5 0

Answer:

$1A

brainiest plz

Explanation:

The elements of a formula only can have the following format:

1) Letter Number as C1

2) Letter $ Number as A$1

3) $ Letter Number as $A1

4) $ Letter $ Number as $A$1

The element $1A is not in the format

You might be interested in
Suppose your parents are planning to take you
Verdich [7]

Answer:

I think the answer would be a smartphone, hope this helps! Comment if I am wrong

4 0
3 years ago
He has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, ta
arsen [322]

Answer: LAN(Local area network)

Explanation:

Local area network(LAN) is the network that is made to cover small amount for area for providing network and computer services.It can usually span in the areas such as a personal room, single building etc.

  • It connects different peripheral devices like printer, switches, tabs etc with the computing system in small certain areas.
  • According to the question, the individual should use LAN network for linking computer with the printer device.
  • As the person has connected laptops, tablets,smartphones, network of printer etc within a network in single space, he is interacting these devices using local area network.
6 0
3 years ago
Uuhdcnkhbbbbhbnbbbbnnnnnnnnnfddjkjfs
Anna35 [415]

Answer:

The answer is "Option c"

Explanation:

In PHP to remove all the session variables, we use the session_destroy() function. It doesn't take any argument is required and then all sessions variables could be destroyed by a single call. If a particular clinical variable is now to be destroyed, the unset() function can be applied to unset a session variable. Its session doesn't unset or unset the session cookie by either of the local variables associated with it.

6 0
3 years ago
How is knowing how to use word or docs importamt?
ollegr [7]
For 90% of users, the word processing capabilities of Google Docs is more than enough. But for some, Microsoft Word's advanced features will be important. ... You also get far more powerful templates, which could speed up your work, depending on what you use Word for.
3 0
3 years ago
4. An abstract data type is defined as _____.
marusya05 [52]

Answer: object that persist set of values and operations as behavior

Explanation: Abstract data types(ADT)are those object value which are dependent upon the collection of the values and collection of the operations.The organization of the data object is not specified in ADT but the operations that are to be carried out are defined in it.

The implementation individuality displayed by the ADT and hiding of the representation or design makes it abstract.

8 0
3 years ago
Other questions:
  • What might be the best response to a cyberbuly attack
    6·2 answers
  • Which of the following controls will provide an area in the form for the user to enter a name? a. button b. label c. text box d.
    8·1 answer
  • EDVAC stands for? on which theory it is made on?
    15·1 answer
  • If you want to transfer information transform STM to LTM, it is essential that you make the information ______________________.
    9·1 answer
  • Persuasion is when Someone speaks to crowd about love <br>○True<br>○False​
    10·1 answer
  • 2. Select the things you can do when working with rows in columns in a spreadsheet:
    5·1 answer
  • 20 points for ez question lol
    9·2 answers
  • Which software manages the functioning of the entire computer system<br>​
    7·2 answers
  • You are considering using Wi-Fi triangulation to track the location of wireless devices within your organization. However, you h
    9·1 answer
  • What type of an attack is being executed if an attacker substituted an invalid mac address for the network gateway so no users c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!