In Excel, the what-if analysis tool to use for finding the input needed for one cell to arrive at the desired result in another cell is called ____________.

a. Goal Find
b. Goal Value
c. Goal Analysis
d. Goal Seek


Answer: d. Goal Seek

Computer Science & Information Technology

You might also like to view...

Create an ER model for each of the following descriptions:

(a) A large organization has several parking lots, which are used by staff. (b) Each parking lot has a unique name, location, capacity, and number of floors (where appropriate). (c) Each parking lot has parking spaces, which are uniquely identified using a space number. (d) Members of staff can request the sole use of a single parking space. Each member of staff has a unique number, name,telephone extension number, and vehicle license number. (e) Represent all the ER models described in parts (a), (b), (c), and (d) as a single ER model. Provide any assumptions necessary to support your model.

Computer Science & Information Technology

What type of malware is typically added to a legitimate program but lies dormant until it is triggered by a specific event?

A. logic bomb B. spam C. zombie D. ransomware

Computer Science & Information Technology

______ are used to prevent others from using your personal data or accessing your documents

Fill in the blank(s) with correct word

Computer Science & Information Technology

Why would you convert a form to be read-only?

What will be an ideal response?

Computer Science & Information Technology