1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
6

Which of formula contains an absolute cell reference?

Computers and Technology
1 answer:
svet-max [94.6K]3 years ago
3 0
Which formula contains an absolute cell reference? =SUM($B$7:$B$9)
You might be interested in
The algorithm ADDN implements N-bit fixed-width binary addition for non-negative integers and ignores overflows. For example, AD
WITCHER [35]

Answer:

This statement is true if and only if both left most bit of both numbers after conversion in 2's complement are different.

Explanation:

If both numbers left most bit is different in 2's complement then no overflow occur and the results of the equation are same.

ADDN (TN (a), TN (b)) = TN (a + b)

This equation satisfies if and only if, 2's complement of both binary number contains left most bit different. If the left most bit of both numbers is same then after addition the bits will be overflowed and result of addition in decimal and then convert to 2's complement will not be equal and above mentioned equation will not be satisfied.

It means that if both numbers have same sign, then 2's complement of both bit have same bits, if we add those numbers in decimal and add by converting them in 2's complement and add them both have different answers.  

7 0
4 years ago
The algorithm credited to Euclid for easily finding the greatest common divisor of two integers has broad significance in crypto
Len [333]

Answer:

a. True                      

Explanation:

  • Euclid's algorithm for finding greatest common divisor of two integers is a very effective method which has importance in cryptography as it is being used in cryptographic schemes and algorithms.
  • This algorithm calculates gcd of  2 integers which is the largest number which divides both the integers.
  • The famous RSA public-key encryption technique also uses extended version of this algorithm to compute modular multiplicative inverse
  • Euclid algorithm is also used in Chinese remainder theorem.
  • This algorithm is not only used in cryptographic algorithm but is also used in breaking these cryptosystems using prime factorization as we know that factorization of large integers is very tough and the security of many cryptography systems depends on this.
5 0
3 years ago
What is meant by the phrase "backing up your data"?
vivado [14]
Backing up your data means "<span>C.making a duplicate copy of the data and storing it in another location" which is very important because hard drives can "crash" and you can lose lots of important work. </span>
5 0
3 years ago
For BitTorrent, which of the following is true:
Bumek [7]

Answer:

d. All of the above

Explanation:

All the above mentioned statements are true about BitTorrent.

8 0
3 years ago
PV = 11,000 AC = 6000 CV = 4,000. What is SV? What does this calculation tell you?
pogonyaev

Answer:

I don't see an SV in the examples.. I suspect these are the name plate numbers off of a transformer... but.. more context would really help

Explanation:

8 0
4 years ago
Other questions:
  • Write a function, factors, that takes an integer n, and returns a list of values that are the positive divisors of n. Note: 0 is
    13·1 answer
  • Organisms are classified as producers or consumers acorrding to the way they
    11·2 answers
  • The picture that graphically represents the items you use in windows is called a/an
    5·1 answer
  • The practice of using similar but not identical domain names is called _____. domain spoofing domain masquerading domain tasting
    13·1 answer
  • If you are inserting an address block with the Address Block dialog box and the fields do not connect automatically, what can yo
    6·2 answers
  • Which of the following best defines Monte Carlo simulation?a. It is a tool for building statistical models that characterize rel
    11·1 answer
  • Write a program that uses a two-dimensional array to store the highest and lowest temperatures for each month of the year. Promp
    10·1 answer
  • Help please i will mark brainlist!
    7·1 answer
  • Explain the pros and cons of touchscreen, non-touchscreen, and hybrid devices:
    12·1 answer
  • Which window would show you bindings for local area connection 2?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!