1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
morpeh [17]
4 years ago
13

What is the purpose of lookup tables in spreadsheet software

Computers and Technology
2 answers:
MrRissso [65]4 years ago
8 0

Answer:

they allow the user to retrieve information form another location in a table

Explanation:

garik1379 [7]4 years ago
7 0

You can easily find and changed the data by using lookup table. You can also find the data within few seconds.

You might be interested in
Five indicators of computer illiteracy​
melisa1 [442]

1. Isn't fluent in "geek language"

2. Doesn't know how to use a web browser and it's features

3. Doesn't understand what a computer is and how it works

4. Doesn't know the basic parts of computer hardware

5. Doesn't know how to use a computer or any other electronics

8 0
3 years ago
SAN Security Issues: What storage security issue might come to be a greater problem in the future?
viva [34]

Explanation:

  SAN security issue is define as storage area network security. Storage area network is the independent network of the storage device and system.

It is scalable and high speed network. By using SAN security we can directly access the storage device. It basically consolidate the sever storage device into the single central storage.

SAN security issue that may turn into the greater problem in the future are:

Network issue is the main issue in this storage device. We make sure that the users can only access that particular file that they want to access.

If the network issue not solve properly then it may cause internal attacks like DOS9Denial of service) attack.  

4 0
3 years ago
What are the OSHA construction standards also called ?
Zarrin [17]
Part 1926 & Part 1910


hope this helps 

5 0
3 years ago
Una pregunta cuales son los ataques de Sindel que por favor y me lo diga gracias
Len [333]
I do not know spanish please say in english
5 0
3 years ago
Imaging a computer is part of what phase of conversion?
grandymaker [24]
B. Because the computer can rearrange itself when it is in a phase of conversion
5 0
3 years ago
Other questions:
  • Which best describes a VPN?
    14·2 answers
  • The Top status bar command is used to display the highest value in the selected range in the AutoCalculate area. (True/False)
    7·1 answer
  • Which part of the os provides users and applications with an interface to manipulate files?
    8·1 answer
  • In __________ write, the data are stored in the cache, and control returns to the caller. Select one: a. a synchronous b. a buff
    8·1 answer
  • Compare and contrast fair use to copyright.
    5·1 answer
  • Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more pack
    7·1 answer
  • Microsoft presentation software tool is called
    10·2 answers
  • Debug
    9·1 answer
  • What can a government use to determine your location at a specific time as long as you're using your mobile device
    6·1 answer
  • Since data-flow diagrams concentrate on the movement of data between processes, these diagrams are often referred to as: A. flow
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!