1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
3 years ago
8

Which method is used to edit a function that has been created and inserted into a cell?

Computers and Technology
2 answers:
Softa [21]3 years ago
8 0

Answer:

ITS D

Explanation:

I got on excel and tested all of them.

(they all work)

8_murik_8 [283]3 years ago
4 0

Answer:

A

Explanation:

A

You might be interested in
"_____ devices improve memory by encoding items in a special way."
Rus_ich [418]
Mnemonic devices improve memory by encoding items in a special way. Mnemonic devices are used in order to help one to improve one's ability to remember a particular information. Its a memory technique that help one's brain to encode and recall important information.
7 0
3 years ago
Can someone be my friend,don't friend me until i ask you Questions
Semmy [17]

Answer:

Explanation:

actually you suck. nevermind.

3 0
3 years ago
Write an expression that executes the loop while the user enters a number greater than or equal to 0.
LekaFEV [45]

Answer:

while (userNum >=0) {...}

Explanation:

In a <u>while loop</u>, <u>the loop is executed until the condition is false</u>.

Since the loop will execute while the user enters a number greater than or equal to 0 (and that number is declared as <em>userNum</em>), we need to check if <em>userNum</em> is greater than or equal to 0.

4 0
3 years ago
Question 5 of 25
Arisa [49]

Answer: d

Explanation; Hopes this helps!!

3 0
3 years ago
Read 2 more answers
3. What of the following is the main components of computer system?
Likurg_2 [28]

Answer:

CPU, input unit, Output unit, memory unit

3 0
2 years ago
Read 2 more answers
Other questions:
  • What daily life problems does the algorithm quicksort solve?
    14·1 answer
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only
    8·1 answer
  • A(n) _________ is any system resource that is placed onto a functional system but has no normal use for that system. If it attra
    15·1 answer
  • A program called a ( n ) ____ translates instructions written in high-level languages into machine code.
    13·1 answer
  • Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1 = 500 kbps, R2
    14·1 answer
  • How do you know if something is in the public domain
    5·1 answer
  • How many total bits are required for a direct-mapped cache with 128 blocks and a block size of 8 bytes, assuming a 4GB main memo
    15·1 answer
  • What do you think that the next version of IR (IR 5.0) will bring if it was discovered in near future? (hint:- advance IR 4.0 fe
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!