1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler79 [48]
3 years ago
7

If you used the VLookup function, where would it look for a value?

Computers and Technology
2 answers:
zheka24 [161]3 years ago
4 0

Answer:

rowwww potapot FG fhvnhtbrhabeynrynrynebeynye eynry eyney eyney e ye enegbe

Evgen [1.6K]3 years ago
3 0

Answer:

IN A COLUMN

Explanation:

Guessed it right edge 2021

You might be interested in
Four kinds of information a writer must document are: _____. A) common knowledge information B) direct quotation summary of a di
Dmitry_Shevchenko [17]
<span>The four kinds of information a writer must document are: summary of a discussion, original ideas, common knowledge information, and direct quotation. These are the fundamental information one must seek in order to fully understand the document.</span>
6 0
4 years ago
Describe how people can work in collaboration with technology to create a better world in 200 words or less.
sweet [91]

Answer:

In today life collaboration is most important because two people knowledge can do better things according to their innovation

Explanation:

mark me brainliest ❤

4 0
3 years ago
How many questions are on the ap computer science principles test
defon
Answer:
70.

Explanation:
The 2021 AP Computer Science Principles Exam is 2 hours long and includes approximately 70 multiple-choice questions. There will be three types of questions: Single-select questions (57 questions).

Hope this help’s!
Please give Brainliest!
5 0
2 years ago
Why is it important to practice safety guidelines when communicating with others via social media platforms?
Alexxandr [17]
Because if people communicate freely, then inappropriate things might be said between them. Some words might even hurt others. Then there is also the case of when someone shares their personal information. If they share personal information, then that person might be at risk of people finding them. Not everyone is who they say they are online and because of this, people need to be careful. Even if someone they are talking to seems trusting.
3 0
3 years ago
Read 2 more answers
Evie clicks through her presentation slides and realizes they all have transition effects coming from the same location, from th
nalin [4]

Answer:

1) Choose Slide

2) Transition Tab

3) Transition To This Slide

4) Select New Transition

Explanation:

There are 4 main steps that Evie needs to take in order to accomplish this. First, she needs to choose the slide that she wants to apply the transition to. Secondly, she needs to click on the Transitions Tab at the top of the application. Thirdly, she needs to go to the "Transition to this Slide" section of the tab. Lastly, she needs to choose one of the available animation/transitions from the list of options. This will apply that transition effect to that slide, so that when she switches to that slide it performs the animation.

4 0
3 years ago
Other questions:
  • In this mode, your presentation will fill up the entire screen. Auto Default Standard Window
    6·2 answers
  • Which of the following tasks is least effective at preventing a computer virus?
    7·1 answer
  • A ________ refers to specific content of a field.
    7·1 answer
  • Symbic Foods, a chain of fast food restaurants, has included a drop-down menu on its main Web site. With this drop-down menu, pe
    13·1 answer
  • It is generally safe to download mobile apps from<br>unknown sources.​
    9·2 answers
  • what program searches the Internet for specified keywords and returns a list of the pages where the keywords were found
    6·1 answer
  • Using social media, such as text messages and status updates, has helped
    10·1 answer
  • ANSWER QUICKLIY
    5·2 answers
  • What are the main dimensions of information system and their components
    13·1 answer
  • In C++ please (read the image below for instructions)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!