1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
3 years ago
8

Which method is used to edit a function that has been created and inserted into a cell?

Computers and Technology
2 answers:
Softa [21]3 years ago
8 0

Answer:

ITS D

Explanation:

I got on excel and tested all of them.

(they all work)

8_murik_8 [283]3 years ago
4 0

Answer:

A

Explanation:

A

You might be interested in
Given a variable n refers to a positive int value, use two additional variables, k and total to write a for loop to compute the
maksim [4K]
You could do it like this (example for n=5).

int n = 5;
int total = 0;
for (int k = 1; k <= n; k++) total += k*k*k;

5 0
3 years ago
Why do we use the internet so much?​
allochka39001 [22]

Answer:

We use the internet because it is a way of finding certain things out that we do not know or a better way of communicating to people who are far away instead of sending a letter to them and it taking 2 to 3 months for it to get to that person.

Explanation:

Your welcome

4 0
3 years ago
Which tool relies on the logged on user's certificate details to encrypt or decrypt files and folders? powershell bitlocker encr
grigory [225]
The tool relies on the logged on user's certificate details to encrypt or decrypt files and folders is the encrypting file system (efs).
It gives filesystem-level encryption as part of the improvement made on Microsoft Windows in version 3.0 of NTFS. This technology allows files to be visibly encrypted to secure confidential data from unsecured access to the computer. 
3 0
4 years ago
6 external computer parts that are input
Lisa [10]
Some external computer parts that are inputs:

Keyboard

Mouse

Microphone

Camera

Joystick

Touch screen monitor
5 0
3 years ago
Que medios se utilizan para respaldar información?
Nataliya [291]
Que es la problem for your question
6 0
3 years ago
Other questions:
  • Suppose a subnet has a prefix 128.119.44.128/26. Give an example of an IP address from this subnet. If an ISP owns a block of ad
    14·2 answers
  • Sam's manager would like him to create and distribute copies of a budget report for each department. The budget report should sh
    10·2 answers
  • Which dialog box opens after selecting a cell in the list of prepared data, clicking the insert tab on ribbon and the clicking t
    6·1 answer
  • How do you take a screen shot with a toshiba computer?
    13·2 answers
  • Both k-means and k-medoids algorithms can perform effective clustering. (a)Explain the strength and weakness of k-means in compa
    5·1 answer
  • Which of the following illustrations is depicted in the icon that's used to access Windows Help and Support files?
    13·1 answer
  • Assignment 1: silly sentences edhesive
    7·1 answer
  • Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services
    12·1 answer
  • _______________ ________________ have human editors that evaluate, select, and organize websites into a hierarchy of categories.
    11·1 answer
  • Which information can you apply to every page of your document with the page layout options?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!