answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkinab [10]
1 year ago
10

Which of the following is an absolute cell reference

Computers and Technology
1 answer:
rodikova [14]1 year ago
6 0

Answer:

The content of the cell is called an absolute cell reference.

Explanation:

Ms-excel can hold a value or string or number or formulas in each cell.  

The end-user can input the values to a cell and do any calculation by using inbuilt formulas and do the necessary calculation and get the output in the required cell  

When end-user try to copy and paste the data to another cell he or she can use paste special option where he or she can select values, by selecting values to end-user is just copying the data not formula this is called absolute reference of the cell

By using paste special end users copy the image or Unicode also.

This process is called an absolute cell reference

You might be interested in
Which of the following commands uses correct syntax for matching the patterns bunk or bank at the end of a line of text?
Alika [10]

Answer:

a. grep 'b[au]nk$' myLine

Explanation:

grep is a command used for searching a specified pattern in a given text.

Our goal is to match the character sequence - bank or bunk at the end of line in a  given line referenced by myLine.

The regular expression for the specified match criterion is:

b[au]nk$

The second character can be either a or u.

$ indicates match at end of line.

So the overall grep command is :

grep 'b[au]nk$' myLine

8 0
1 year ago
Where does an MPLS label go in a PDU?
Natalija [7]

Answer: Between Layers 2 and 3

Explanation:

In between Layer 2 and Layer 3 the MPLS header is present and is known as Shim header. It is also said to be in 2.5.

6 0
1 year ago
Develop an EER model for the following situation using the traditional EER notation, the Visio notation, or the subtypes inside
podryga [215]

Answer:

Explanation:

To develop the model for Creating the supertype/subtype relationship three diffrent types of notation is given bellow accrdig to the diagram attached.

1.Traditional EER (Enhance Entity-Relational) notation

2.Microsoft Visio notation

3.Subtypes Inside supertype note

<em><u>Traditional EER(Enhance Entity-Relational)notation for the international school of technology diagram is attached bellow</u></em>

The diagram consist of the following entity

Room Supertype

Media Entity Type

COURSE entity type

Section weak entity type

Schedule associatiative entity type

<u><em>Microsoft Visio Notation for the international school of technology  is ashown in the diagram bellow.</em></u>

The diagram consist of the following entity

Room Supertype

Media Entity Type

Computer entity type

Instructor entity type

Time slot entity type

<u><em>Subtype Inside Supertype note Notation for the international school of technology  is shown in the diagram bellow.</em></u>

The diagram consist of the following entity

Room Supertype

Media Entity Type

Computer entity type

Instructor entity type

Time slot entity type

3 0
2 years ago
A user called to inform you that the laptop she purchased yesterday is malfunctioning and will not connect to her wireless netwo
kakasveta [241]

Answer:

You can perform the following two steps

Explanation:

  1. Have the user press the appropriate function key combination to enable the wireless radio and then attempt to connect to the wireless network (since by mistake he could have disabled it).
  2. Ask the user to turn on the laptop’s airplane mode and attempt to reconnect to the wireless network (this mode basically what it does is disable adapters and activate it will connect the Wi-Fi network).
7 0
2 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
2 years ago
Other questions:
  • Email, instant messaging and most web traffic go across the internet in the clear; that is, anyone who can capture that informat
    15·2 answers
  • Jenny has to include the image of a sun on one of her slides. She needs to write relevant text about it on a dark background on
    6·1 answer
  • When your tire blows out in the middle of a drive, you should _____. A. let go of the steering wheel B. pump the brakes immediat
    13·2 answers
  • Does the Boolean expression count &gt; 0 and total / count &gt; 0 contain a potential error? If so, what is it?
    8·1 answer
  • A U.S. social security number consists of a string of 9 digits, such as "444422333". Assume that input consists of a sequence of
    6·2 answers
  • Which of the following is true with regard to defensive programming? Preconditions should never be visible to callers. Program c
    8·1 answer
  • Write a loop that counts the number of space characters in a string. Recall that the space character is represented as ' '.
    11·1 answer
  • Quantum units of information deploy the properties of entanglement and ____ to offer exponentially greater computing power.
    9·1 answer
  • Write a program using integers userNum and x as input, and output userNum divided by x four times. Ex: If the input is 2000 2, t
    5·1 answer
  • The program DebugTwo2.cs has syntax and/or logical errors. Determine the problem(s) and fix the program.// This program greets t
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!