1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
2 years ago
15

A cell's address, its position in the workbook, is referred to as a ________________ when it is used in a formula.

Computers and Technology
1 answer:
Inga [223]2 years ago
5 0

Answer:

A cell's address, its position in the workbook, is referred to as a <u>cell reference</u>  when it is used in a formula.

You might be interested in
In this exercise you will debug the code which has been provided in the starter file. The code is intended to do the following:
abruzzese [7]

Answer:

The corrected code is as follows:

import java.util.Scanner;

public class U2_L4_Activity_Two{

public static void main(String[] args){

Scanner scan = new Scanner(System.in);

String str1 = scan.nextLine();

String str2 = str1;

str1 = str1.toUpperCase();

System.out.println(str1);

System.out.println(str2);

}

}

Explanation:

This corrects the scanner object

Scanner scan = new Scanner(System.in);

This line is correct

String str1 = scan.nextLine();

This copies str1 to str2

String str2 = str1;

This converts str1 to upper case

str1 = str1.toUpperCase();

This prints str1

System.out.println(str1);

This prints str2

System.out.println(str2);

8 0
3 years ago
Any two differences between third and fourth generation of computer
Setler [38]

Answer:

Third generation computer use integrated circuit(IC) and it was fast and reliable.

Forth generation computer micro computer were introduced and they were highly reliable and fast.

5 0
2 years ago
Read 2 more answers
how can i stop this stupid thing from sending me emails because my school decides to not give you a block option
tekilochka [14]

Answer:

If it on g mail you go to the spam box and then press the spammers to account and then press block and then you will block them.

5 0
3 years ago
Read 2 more answers
What is a malicious actor essentially looking for when attempting a network attack?
ahrayia [7]

Answer:

information of personnel

Explanation:

4 0
3 years ago
You just bought a new hard drive for your computer. You plan to use this as a secondary hard drive to store all your UMA files.
Neko [114]
When you get it you need to make Shure the computer knows you have it
4 0
3 years ago
Other questions:
  • I need help making a survey for highschool students in my school any topics/questions?
    9·1 answer
  • Kai is a software engineer who started his own IT consulting firm. His friend, Catalina, is the owner of a store that sells offi
    13·2 answers
  • Scientific models can be used for a variety of different purposes. Which of the following statements about scientific models is
    7·2 answers
  • Which is the correct sequence of steps for opening a new document?
    10·2 answers
  • Which of the following is not an advanced strategy you may use to help you conduct a search on the Internet?
    12·1 answer
  • Which method is used for resolving data dependency conflict by the compiler itself?
    6·1 answer
  • All computer systems have
    14·2 answers
  • How would you describe<br> "analogous color harmony" to a six year old?
    13·1 answer
  • Need help with this, will give brainliest
    15·1 answer
  • Which are ways that technology keeps you hooked?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!