1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena-2011 [213]
3 years ago
10

Why are formulas used in spreadsheets?

Computers and Technology
1 answer:
cluponka [151]3 years ago
7 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is B.

The formulas in the spreadsheet are used to do the automatic calculation when data is changed in the spreadsheet.

For example, if you add numbers in a column and then get average. you can use sum() and average() formula to calculate the sum and average of numbers in a column. If you will change any number in the column, the calculation for sum and average automatically done. So, the answer to this question is B. i.e.

so that calculations are automatically redone when data is changed.

While the other options are not correct because:

  • To ensure data is entered correctly is done by validation not by using formula.
  • To ensure data is properly formated is done in the formatting section.
  • The error can be easily identified using validation features in excel.

You might be interested in
Programmers employ the acronym ____ to mean that if your input is incorrect, your output is worthless.
Nataly [62]
The answer is GIGO or the garbage in, garbage out. It is an idea regular to software engineering and science: the nature of yield is dictated by the nature of the information. In this way, for instance, if a scientific condition is disgracefully expressed, the appropriate response is probably not going to be right. It has a tendency to be utilized when discussing information section and databases. Essentially it implies that in the event that you enter off base or wrong information then you have truly entered waste.
8 0
3 years ago
A data center designer requested additional lighting for the entrance to the data center as well as the removal of a object whic
Ira Lisetskai [31]

Answer:

SURVEILLANCE-SPECIFIC DESIGN.

Explanation:

Defensible space offers a series of architectural guidelines that can be used in the design of new urban residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance. The designs are: site interrelationship design, site design, street design and surveillance-specific design.

Surveillance-specific design can be used to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (entrances, lobbies, elevator waiting areas, parking areas e.t.c.) so as to be directly visible from as many viewpoints as possible.

Since the data center designer requested additional lighting for the entrance to the data center as well as the removal of a object which is blocking security's view of the entrance, then it is an example of SURVEILLANCE-SPECIFIC DESIGN.

6 0
3 years ago
A. =A1&lt;= A14<br> B. Income – Expenses<br> C. SUM(A1:A14)<br> D. =150*.05
Tpy6a [65]
B that the anser yep i whent and reserch the the anser so itsb
8 0
4 years ago
Describe at least five ways in which information technology can help students studying subjects other than computing
bija089 [108]

Answer:

yan lang po sana makatulong

5 0
3 years ago
Wanda manages an application that fluctuates in usage quite a bit. Sometimes it uses quite a few servers with lots of memory and
TEA [102]

Answer:

c. Elasticity

Explanation:

When referring to Cloud Servers this capability is known as Elasticity. It basically describes how able and efficient a server is to automatically implement resources and remove resources in order meet the specific amount of demand at any given moment. Many times a server will not have much demand but will still have all the resources being used by the server. Being able to remove these unused resources so that they are available for other usage is what makes the servers elastic.

8 0
3 years ago
Other questions:
  • Chris needs to modify the default bullets that are used in a nonnumbered list in word. Which method should he use?
    9·2 answers
  • 1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
    6·1 answer
  • My computer keeps shutting down I've tried to completely wipe the memory but it didn't work do you have any ideas how to fix it
    7·1 answer
  • The purpose of the ________ element is to describe the contents of a table.
    15·1 answer
  • Brian is selecting an authentication protocol for a PPP connection. He would like to select an option that encrypts both usernam
    7·1 answer
  • 1. Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bit memory address
    7·1 answer
  • 1.Menciona tres factores o variables que consideras influirán en el oscurecimiento del alimento cortado o pelado expuesto a la i
    8·1 answer
  • Why are control components necessary in traditional software and generally not required in object-oriented software?​
    11·1 answer
  • Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company
    9·1 answer
  • __________ may be defined as the application of methods and means to ensure that test results are reliable and valid, and errors
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!