1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maru [420]
3 years ago
6

A spreadsheet has some values entered: Cell A1 contains 10, cell A2 contains 14, cell A3 contains 7. You enter in cell A4 the fo

llowing: =A1+A2. What value is displayed in A4?
A. 10
B. 12
C. 14
D. 24
Computers and Technology
1 answer:
lesya [120]3 years ago
5 0
The value displayed in A4 is 24
You might be interested in
The human resource (HR) manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadshe
kondor19780726 [428]

Answer:

WAHTSTFYHHTHIEBWIBWDKF

Explanation:thx

FOR A SEC

7 0
4 years ago
Write an algorithm which gets a number A, if it is even, prints even, and if it is odd prints odd.
juin [17]

Answer:

The algorithm to find A is even or odd.

  1. input A.
  2. Check the remainder on diving by 2 by A%2.
  3. If remainder is 1 then A is odd Print(Odd).
  4. If remainder is 0 print(Even).

Explanation:

To check if the number is even or odd we use modulo  operator(%).Which gives the remainder on dividing.So if we do this A%2 it will give the remainder that will come out on dividing the value of A by 2.

So if the remainder comes out is 1 then the number is odd and if the remainder is 0 then the number is odd.

7 0
4 years ago
The following is the correct way to write a for loop
Rzqust [24]

Answer:

for i in range

Explanation:

This is the only excerpt of code

3 0
3 years ago
You are auditing a client's network and have gained physical access to a workstation. To prevent any security software from dete
Llana [10]

Answer:

OphCrack LiveCD.

Explanation:

The user examines that server of a client, as well as requires complete control of such a system. To avoid recognizing its invasion by certain security programs, he wants to select a LiveCD which can break Operating System's credentials,  and he would have been using OphCrack LiveCD because it used to crack the credential of the Windows user.

So, the following are the reason by which the answer is correct according to the scenario.

3 0
3 years ago
What are the process of boots up a computer?​
Sindrei [870]

Answer:

in computer booting is the process of starting a computer it can be initiated By hardware such as button press or by a software command after it is switched on a computer central processing unit ( CPU)

3 0
3 years ago
Other questions:
  • Create a cell reference in a formula by typing in the cell name or
    7·2 answers
  • Now, my Laptop has been working since I bought it yesterday it won’t start up and it when it does it overheats and shuts off, th
    10·2 answers
  • What role does the agenda play in a webinar??
    14·1 answer
  • Write a program named ArrayDemo that stores an array of 10 integers. (Note that the array is created for you and does not need t
    14·1 answer
  • (a) Define a goal for software product quality and an associated metric for that attribute. (b) Explain how you could show that
    7·1 answer
  • If there is only a stop sign posted at a railroad
    9·1 answer
  • Hello im looking for someone to answer my question. Its about a coding project called "Quiz Master". Im having trouble with the
    7·1 answer
  • How do you change your grade level
    10·1 answer
  • What is an insertion point?
    6·1 answer
  • Please please help I don’t understand this
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!