1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
joja [24]
3 years ago
6

Suppose cell C5 contains the formula =B$6+C1.

Computers and Technology
1 answer:
ddd [48]3 years ago
4 0

Answer:

=A$6+B4 will be in B8

=B$6+C6 will be in C10

=C$6+D2 will be in D6

=D$6+E1 will be in E5

Explanation:

$ sign is used to lock a certain column or row value, with the $ sign we can create an absolute reference which will remain unchanged as we copy our formula from one cell to another.

As formulars are copied, the references change respectively.

With =B$6+C1 in C5 ; As we move up or down of cell C5, only the row numbers will change that is formula in C6 becomes =B$6+C2.

As we move left and right, the column alphabet will also experience change like the rows did.

Only the absolute reference won't change no matter the direction.

Hence,

=A$6+B4 ; A and B means one move to the left of C5 and 4 signifies, 3 moves downward of C5 that gives B8

=B$6+C6 ; B and C means no horizontal change, 6 means 5 moves downward of C5 which gives C10

=C$6+D2 ; C and D means 1 move to the right and 2 means one move downward of C5 which gives D6

=D$6+E1 ; D and E means 2 moves to the right and 1 means no vertical change from C5 ; which gives E5

You might be interested in
You work as a network technician for uCertify Inc. You have erased data saved in your laptop. You still have many device configu
zloy xaker [14]

Answer:

Data remanence

Explanation:

Data remanence is the retention of erased data on a magnetic medium. Sensitive detection systems can pick up the residue (remnants) from previously recorded data even though the area has been rewritten.

This is not a simple procedure; however, it is employed if the <u>missing information</u> is related to national defense or some other critical situation

7 0
4 years ago
The cost of a given amount of computing power has _____.
lana [24]

Answer:

decreased drastically over the last five decades

Explanation:

I would say it is that answer because a few decades ago we needed huuuge computers that filled rooms to compute simple tasks. Now we have cellphones, which are basically computers that can fit into the palm of our hands. Our phones can do more than what those huge computers of the past did and they're easier to produce. So cost must have drastically decreased.

3 0
3 years ago
Read 2 more answers
What dialogue box is used for character formatting?
valentinak56 [21]

Examples of character formats that can be applied to text characters in Word include those you find in the Font dialog box (such as bold, italic, underline, font, size, color, superscript, subscript, scaling, animation effects, etc), highlight, change case, etc. To apply a character format to a character or a set of characters, you need to specifically select the desired amount of characters and then apply the formatting you want.

5 0
3 years ago
What is is plagiarism?
STALIN [3.7K]
Plagiarism is taking the work of others word by word and saying that it’s yours.
5 0
4 years ago
Read 2 more answers
One type of CAPTCHA is ________. a rootkit virus the wavy hard-to-read letter and number sequence that you type to prove that yo
sergejj [24]
<h2>password method</h2>

Explanation:

Rootkit virus is one type of virus which is hidden about its existence and tries to affect the maximum number of system.

Password method: This is a graphical method to identify the text hidden in the signature and confirming that it is not a robot or any other system to protect the system from hacking. This would be really hard-to-read and thus ensures safety.

Antivirus software: This is a system to protect the system, when the virus tries to attack the system. An indication will be given through the software to the user.

4 0
3 years ago
Other questions:
  • The intended purpose of the following module is to determine whether the value parameter is within a specified range. The module
    14·1 answer
  • A company's computers monitor assembly lines and equipment using ________ communications.
    6·1 answer
  • 12. In Microsoft Word, when you highlight existing text you want to replace, you are in A. basic mode. B. automatic mode. C. ins
    10·2 answers
  • You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why
    11·1 answer
  • A database is a collection of ________ data.
    15·1 answer
  • Assume that a file containing a series of integers is named numbers.dat and exists on the computer's disk. design a programt hat
    15·2 answers
  • In which type of modulation is a 1 distinguished from a 0 by shifting the direction in whichthe wave begins?
    14·1 answer
  • HTML and CSS are computer languages used to create what?
    11·1 answer
  • To quit, a user types 'q'. To continue, a user types any other key. Which expression evaluates to true if a user should continue
    7·1 answer
  • What is stored in studentScores after running the program code?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!