Indicate if the statement is true or false False 1. A spreadsheet cannot recalculate after you have changed data in your worksheet. 2. A spreadsheet uses formulae to carry out operations on numerical data. 3. A range is a group of cells that form a rectangle. 4. A value is titles and headings used in a spreadsheet. 5. You cannot format a spreadsheet like a word processing document by bolding and underling headings. 6. A label is a text entry. 7. You cannot copy a formula in a spreadsheet. 8. To find the largest value in a set of values the formula is: MAX(first Cell:Last Cell) You can produce a chart to represent the data in a spreadsheet.​

Answers

Answer 1

Answer:

False

Explanation:

a spread sheet can recalculate any number of times

Answer 2

There are different kinds of software. The answers are below;

A spreadsheet cannot recalculate after you have changed data in your worksheet is a false statement. A spreadsheet uses formulae to carry out operations on numerical data is a true statement. A range is a group of cells that form a rectangle on a screen is a true statement.  A value is titles and headings used in a spreadsheet is a false statement.  You cannot format a spreadsheet like a word processing document by bolding and underling headings is a false statement.A label is a text entry is a true statement.You cannot copy a formula in a spreadsheet is a false statement To find the largest value in a set of values the formula is: MAX(first Cell:Last Cell) is a false statement.

What is a Spreadsheet?

This is known to be a kind of arrangement of cells usually in columns and rows. It is used to organize, analyze, calculate and report any kind of information and it is often done in numerical form.

Learn more about spreadsheet from

https://brainly.com/question/4965119


Related Questions

Two people, Alice and Bob are using the key sharing algorithm. They have chosen a clock size of 17 and a base of 5. Alice's private number is 4, while Bob's is 6. The first step in creating the shared key is for each party to generate a PPN based on their private number, the base and the clock size. Alice has already sent her PPN to Bob. She receives Bob's PPN, which is 2. Alice uses Bob's PPN (2), her private number (4), and the clock size (17) to calculate the shared key. What is it

Answers

Answer:

fsfsf

Explanation:

These 2 questions PLEASEEE (:

Answers

Answer:

on the first one pixels on the second i think it is feathering

you are creating a bugdet for your new business what should you include
A.All income and expense

B.Fixed expense but not income
C.income but not variable expense
D.Fixed and variable expense but not taxes

Answers

Answer:

A is your answer (not entirely sure but I hope it helps!)

HELP THIS IS SO DIFFICULT

Answers

It would be 11111, and decimal 31
Answer:

Binary: 11111

Decimal: 31

Explanation: Hope I was able to help!

what is a sensitive compartmented information program

Answers

Answer:

cpu

Explanation:

what are titles that i should talk about in my ppt about history of computer science???????
i need help ASAP ! thank you!

Answers

Talk about who created it when it was created and the begging of it. Talk about how it established over the years. Then talk about the achivements like the first computer.

Elements of design that distracts the player from the theme and objective of the are called

catfish
red herrings
haystacks
MacGuffins

Answers

Answer:

Red herrings...?

I think Red herrings?

Randy is an active man who just learned how to swim. Which of these
attributes is part of his social identity?
A. Learner
B. Swimmer
C. Man
D. Active

Answers

Answer:

C

Explanation:

social identity is given, chosen, and core. Your given identity consists of the conditions that are outside of your control such as birthplace, gender, certain family roles or physical characteristics.

Randy is an active man who just learned how to swim. This attribute is a part of his social identity as a learner. The correct option is A.

What is social identity?

Social identity is innate, predetermined, and fundamental. Your predetermined identity is made up of circumstances beyond your control, such as your location of birth, gender, certain family responsibilities, or physical traits.

The social identity of a person reveals who they are in terms of the groups they are a part of. Social identity groups are typically described by some of an individual's physical, social, and mental traits.

Here, the man just learned swimming, so his identity will be learner because he is not a pro in swimming and does not have experience.

Therefore, the correct option is A. Learner.

To learn more about social identity, refer to the link:

https://brainly.com/question/13652356

#SPJ2

What is the correct answer

Answers

Answer:

Multiuser/Multitasking

Explanation:

The question will be answered using the following two points:

- The fact that the operating system allows Ali and his friend to be logged on at the same time is known as a multiuser operating system

- The fact that the operating system allows Ali's friend to access documents while Ali is still logged in is refer to as multitasking.

Add me as brainlist

can someone help me, please

Answers

Answer:

eeeee

Explanation: flamingo youtooz

¿Por qué se distribuye la electricidad a alta tensión y no a baja?

Answers

Answer: La energía eléctrica es un producto del voltaje y la corriente (P = IV). También es el producto de la resistencia y el cuadrado de la corriente (P = IxIxR). A medida que transmite energía eléctrica a través de cables, encontrará pérdidas de potencia por resistencia de cables. Cuanto mayor sea la corriente, mayores serán las pérdidas de potencia de resistencia.

Help me plzzzzzzzzzzzzz

Answers

Answer:

(3)squareroot23)ru(jump)-MArio(input)

Explanation:

Mathematics includes the study of such topics as quantity, structure, space, and change. It has no generally accepted definition. Mathematicians seek and use patterns to formulate new conjectures; they resolve the truth or falsity of such by mathematical proof. -_mathsMARIO.(input_f

Yeni

- - - - -- - - -- - -- - --- -- - - -- Mario

How are the functions different and how do i determine the answer

Answers

Answer:

this isn't a fair question...

you'll either get 2,3 or 4

not a nice question


You set a sensor to wake up every five minutes to measure the temperature.
This is an example of _____
a device.

Answers

The missing term in the fragment would be programming referring to:

You set a sensor to wake up every five minutes to measure the temperature. This is an example of programming a device.

What is programming?

Programming is a computer term to refer to the process by which the necessary actions to carry out a project are devised and ordered.

Currently, the notion of programming is closely associated with the creation of computer applications and video games. However, these processes are associated with most machines because it is possible to program them for a specific operation.

According to the above, in the example of a device to take the temperature every five minutes, it would be the programming of the device for that task.

Learn more about programming in: https://brainly.com/question/11288081

Answer:

configuring

Explanation:

how to book a flight online

Answers

Answer:

https://www.wikihow.com/Book-a-Flight

Explanation:

Here is a simple article I found online on how to do it.

Answer:

First find what airplane you want to attend. Check pricing, seats, legit website, etc.

Next you pick where you want to go and they will show you what is required like id, name, last name, number, etc.

After you apply i think they send you the ticket or you go pick it up.

Hope it helps you

Explanation:

which is an ipsec protocol that authenticates that packets received were sent from the source?

Answers

Answer:Encapsulating Security Payload (ESP)

Explanation:Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for IP packets.

how to copy bookmarks from one computer to another

Answers

Answer:

I'd recommend making an account for the browser.

where and how could you use a switch made out of aluminum foil or copper

Answers

Answer:

You can use the foil as a conductor for the power and you can use the copper as an insulator to break the electric current

Explanation:

Someone please help me

Answers

Answer:

first answer is correct 8

second answer is 12

Ưu nhược điểm của cuộn cảm

Answers

Answer:

yvhchfjfhvjvbjbhkhihihigivjbib

which way do you swipe in the android os to access shortcuts

Answers

You can swipe from right to left to access shortcuts or the notification bar in Android OS.

you can apply the bold font style by pressing the ____ keyboard shortcut keys.

Answers

Answer:

CRTL + B

Explanation:

Control plus b in series

!!help!!
Why is it a good idea to store numeric data in variables in a program?​

Answers

Answer:

D I think

Explanation:

A company is completing research and development for software which it is planning to produce in approximately 2 years time. Which of the following assumptions should the company make about the transistor density of the hardware which will be used to run this software?Group of answer choices

Answers

Answer:

The transistor density of the hardware which will exist in 2 years time will likely be double the current processing speeds.

Explanation:

The other 3 options are incorrect

Answer:

The transistor density of the hardware which will exist in 2 years time will likely be double the current processing speeds.

Explanation:

I just got that feeling.

mention any four features which a standard computer laboratory should have​

Answers

Answer:

Explanation:

Computers

Outlets

Desks

Servers

The four features that a standard computer laboratory should have​ are a computer system, power source, Desk and chairs, and Server and Lan connectivity.

What is a computer?

A computer is a digital electrical machine that may be configured to automatically perform arithmetic or logical functions. Programs are general collections of operations that modern computers can do. These programs allow computers to do a variety of jobs.

The four features that a standard computer laboratory should have​ are:

Computer systemsPower source to power computerDesk and chairs for computers and studentsServer and Lan Connectivity

Hence, the four features that a standard computer laboratory should have​ are a computer system, power source, Desk and chairs, and Server and Lan connectivity.

Learn more about Computer:

https://brainly.com/question/21080395

#SPJ2

the full meaning of UNIVAC and ENIAC​

Answers

Explanation:

ENIAC - Electronic Numerical Integrator and Calculator. UNIVAC - Universal Automatic Computer (First Digital Computer)

hope it's help you cutty

UNIVAC

UNIVAC, which stood for Universal Automatic Computer, was developed by J. Presper Eckert and John Mauchly, makers of ENIAC, the first general-purpose electronic digital computer.

ENIAC

ENIAC filled an entire room.ENIAC stands for Electronic Numerical Integrator and Computer. John Mauchly and J. Presper Eckert built the machine at the University of Pennsylvania at the behest of the U.S. military.

Hope it helps

Thank You !!!

when is the new season of legacies coming out on netflix

Answers

Answer:

Not sure (I couldn't find info) but It is coming out on CW

Explanation:

It is coming out on CW on October 14 2021 so the Netflix release will be much later than that.

What is the difference between algorithm and program?

Answers

Answer: The difference is that an algorithm is a precise step-by-step plan for a computational procedure that mainly begins with input value, yields, and output value. While a program is instructions written in code to explain to a computer what to do. Like how the CPU can send a command to the GPU to tell it what image to make. The better the CPU the better and faster it can read and complete it's given instructions.

Explanation: Trust me with this.

what is the most important part of the operating system of the computer

Answers

Answer:

motherboard

Explanation:

The online underground is used _____. Select 3 options.

Answers

You forgot to put the options
Other Questions
Aling kabihasnan ang itinuturing na biyayang Nile? An excess of sodium carbonate, Na, CO3, in solution is added to a solution containing 17.87 g CaCl2. After performing theexperiment, 13.19 g of calcium carbonate, CaCO3, is produced. Calculate the percent yield of this reaction. what is the deffinition of a bus network topology. along with a list of benifits and disadvantages of using a bus topology with many devices attatched. will give brainliest if answer is complete and good. Excerpt from Inaugural Address, May 10, 1994Nelson MandelaLet there be justice for all.Let there be peace for all.Let there be work, bread, water and salt for all.Let each know that for each the body, the mind and the soul have been freed to fulfill themselves.What rhetorical device is used in this speech excerpt?es )A)metaphorB)personificationrepetitionDsimileAuthor's Purpose and Craft Ill give BRAINLIEST I need the equations and coordinates to graph need an answer asap. answer the 3 guide questions asap. The difference between an antagonist and a villain Physical science includeschemistry.life science.physics.two of the above. I NEED THE RIGHT ANSWER ASAP IT NEEDS TO BE 100% ACCURATE NO LINKS !!!Which type of force will an object move towards?1: weakest2: net3: balanced4: strongest Find the measure of angle x. 70 The product of twice a number and four is the same as the difference of seven times the number and 7/3. Find the number. how much smaller is 25 that the product -12 and -3 You document these vitals for a patient:VITALS: 120/89, 99.6 (R), 72, 14What is the patient's pulse?1208999.6u7214 True Or False?Organic materials are the remains of once-living organisms (30%) Test.java: write a test program to create a hash table with the size of 109. Import 65 data items (given by a text file). The data file " broster.txt " is provided, which contains the all players of Cleveland Browns (2019). Please use the first column, the last name, as the key, and treat the rest of information as value. Please perform the following tasks after the data are imported to the hash table: Print out the number of collisions occurred during the data insertion, and discuss which approach causes more collisions. Comparing the resulting tables between Linear Probing and Double Hashing, and have a discussion which approach has a more obvious trend of clustering. the right of citizens of the united states to vote shall not be denied or abridged ngha ca thn thoi cy la you are hiking along a trail that in 13 miles long.you plan to rest every 2miles.how many rest stops will you make? What is the answer to [tex]-9(\sqrt{x} -9) -9[/tex] magtala ng 5 na lugar kung saan nanirahan ang mga sinaunang Pilipino