Which of the following What-If analysis tools is an add-in?
A) Goal Seek B) PivotTable C) Solver D) Scenario Manager
C
You might also like to view...
In addition to the NIST Digital Signature Algorithm and ECDSA, the 2009 version of FIPS 186 also includes several techniques based on _________ , all of which were developed by RSA Laboratories and are in wide use.
Fill in the blank(s) with the appropriate word(s).
The ______ is a binary function between 0.5 and 1.0 .
a. exponent b. mantissa c. real number d. sign e. none of the above
A toolbar is a row, column, or block of buttons that represents tasks you can perform within the program with a single click
Indicate whether the statement is true or false
A pointer access can sometimes (but not always) be replaced using subscript notation.
Answer the following statement true (T) or false (F)