1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ch4aika [34]
3 years ago
7

Which symbol should you use for entering a formula in a cell?

Computers and Technology
2 answers:
Natasha_Volkova [10]3 years ago
4 0

Answer:

ITS + AND =

Explanation:

My name is Ann [436]3 years ago
4 0

Answer:

Explanation: The equals operator is used in the Microsoft excel for the indication of formula in a cell .

Explanation:

You might be interested in
_____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
Maksim231197 [3]

Answer:

The answer to this question is "Confidentiality".

Explanation:

The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.

So the answer to this question is Confidentiality.

4 0
3 years ago
Safety Data Sheet gives information about
Elina [12.6K]
Safety Data sheet gives information about the product imported in a form of a document. Importers and manifacturers make these Safety Data sheet to detail the product of its physical and chemical properties which are hazardous and harmful. This is a safety protocol on every company.
8 0
4 years ago
Read 2 more answers
What might happen if you haven't decided on a course of action when you're within 4-6 seconds of the intersection?
Delicious77 [7]
You Could Cause An Accident To Happen.
7 0
4 years ago
Which of the following forces all traffic, communications, and activities through a single pathway or channel that can be used t
Ad libitum [116K]

Answer:

Option b. Choke point

Explanation:

In firewall, a choke point can be defined as a single point which allows all of the network traffic including incoming and outgoing to be funneled. As the passage of the whole traffic through the choke point regulates the flow as it focus monitoring  and controls bandwidth consumption, provides authentication, control efforts like Internet firewalls.

7 0
3 years ago
What was the technology that defined each of the four generations of computers?
mihalych1998 [28]

Answer:

Binary representation

Explanation:

It's certainly the binary representation. And it will probably be part of all the upcoming generations. No matter what you need to be done through the computer, you are certainly going to require to make use of the binary representation. And without it, you can never think of a computer. Either it's hexadecimal or the ASCII representation, they all are being converted to binary representation for ensuring their compatibility with the computer requirements. The computer only understands binary representations. And that is since an electronic or electrical or anything computable can be zero or one only. And that is why they can be computed as circuit technology is being used finally, and it can be either on or off. And to date, the third option has never appeared to be feasible. We need to ensure that a computable should be at quantum level be either 0 or 1, or either on or off.

8 0
3 years ago
Other questions:
  • Which of the following can be used to replace internal network addresses with one or more different addresses so the traffic tha
    9·1 answer
  • Can some one please help The term career is usually applied to a what PLEASEEEEEEEEEEEE HEEEEELLLLLPPPPP MEEEEEE
    7·1 answer
  • All of the following are recommended to secure a wireless network EXCEPT:
    5·2 answers
  • When executing System.out.println(a2), the toString() method in the Object class is invoked. The program cannot be compiled, bec
    11·1 answer
  • Click cell i13 and calculate the agent commission using the base cost of the trip and a vlookup function that returns the commis
    9·1 answer
  • Which of the following is NOT true about a savings account
    9·1 answer
  • What is blogging
    15·2 answers
  • A network administrator has configured ​VLAN 99 as the management VLAN and has configured it with an IP address and subnet mask.
    7·1 answer
  • Refer to the exhibit. What kind of NAT is configured on the ASA device?
    10·1 answer
  • Label some of the main service provided by the internet.using the picture​.. please...
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!