1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
5

ANSWER ASAP GIVING BRAINIEST FIVE STAR AND HEART!

Computers and Technology
2 answers:
scoundrel [369]3 years ago
8 0

A formula is statement written by the user to be calculated. Formulas can be as simple or as complex as the user wants. A formula can contain values, references to cells, defined names, and functions.

All formulas must start with the equals sign. =1+2+3

A function is a piece of code designed to calculate specific values and are used inside formulas. Functions to sum values, calculate a trigonometric cosine, and to calculate the current time are built into excel. Additional functions can be defined using Visual Basic.

Functions are typed alongside parenthesizes, where in the arguments if any are listed in between. To use functions in a formula, for example

=COS(3.14) will return the calculated cosine. =NOW() returns the current time. =SUM(1+2+3) *2 will multiply the sum by 2Explanation hope it helps

Delicious77 [7]3 years ago
3 0
A function is a built-in operation, such as SUM() , AVERAGE() , etc. ... The difference is that a function is a built-in calculation, while a formula is a user-defined calculation. A formula could just use a single function. For example, if you enter =AVERAGE(A1:A56) , that is a formula, using the AVERAGE function.

Different: A formula is any calculation in Excel, but a function is a pre-defined calculation. =MAX(A1:B20) is a formula containing a function. Mastering the use of functions in formulas is a key skill in learning financial modelling.
You might be interested in
In an ha configuration, which two failure detection methods rely on icmp ping? (choose two.)
Hunter-Best [27]
I believe that the multiple questions attached to this question is 

a) Hello
b) Link groups
c) Path groups
d) Heartbeats

The Answer is B and C
The physical interfaces that are supposed to be monitored are connected into a link group and a firewall failure can be triggered when one or all physical interfaces in the group failPath Monitoring helps monitor the full path to mission critical IP addresses. By default, any one of the IP addresses becoming unreachable will end up causing the firewall to change the HA to tentative state
7 0
3 years ago
With a(n) ____ structure, you perform an action or task, and then you perform the next action in order.
e-lub [12.9K]
The answer is a <u>sequence structure</u>
8 0
3 years ago
What are they ethical issues with Drones?
guajiro [1.7K]
They may invade privacy rights of air space and be used for other unintended acts such a bombings and espionage
4 0
3 years ago
I have a message for anyone reading this
uysha [10]

Answer:zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz

Explanation:

4 0
3 years ago
Please Complete in Java a. Create a class named Book that has 5 fields variables: a stock number, author, title, price, and numb
Gala2k [10]

Answer:

Explanation:

The following code is written in Java. I created both versions of the program that was described in the question. The outputs can be seen in the attached images below. Both versions are attached as txt files below as well.

Download txt
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> txt </span>
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> txt </span>
13e8818abb53c8bc7547a966a10a101d.jpg
8623bf9304771a3e1c8581a41a9c11f6.jpg
8 0
3 years ago
Other questions:
  • Write a method so that the main() code below can be replaced by the simpler code that calls method mphAndMinutesToMiles(). Origi
    6·2 answers
  • How to Save Power-Point presentation as a single file Web page that can be uploaded to the World Wide Web ?
    14·1 answer
  • In Word, a red wavy underline indicates a/an
    15·1 answer
  • List at least three benefits of automated testing?
    13·1 answer
  • A type of Knowledge Management System is called
    5·1 answer
  • Anyone know how to delete that I need ASAP
    13·1 answer
  • When an external device becomes ready to be serviced by the processor the device sends a(n)_________ signal to the processor.
    8·1 answer
  • (25 POINTS) Some applications work on all devices while others work on some devices. True or False?
    13·1 answer
  • What is a personal data?
    12·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!