Button subprocedure to store user-s name in cell

Assignment Help Basic Computer Science
Reference no: EM1347527

Q1) If you wish to take in and store user's name in cell A1 by having them type their name following prompt declaring "Give me your name, Earthling!" that code excerpt must you use within button subprocedure?

Answer

a. InputBox("Give me your name, Earthling!" , "Earthling Name Retrieval" , "T.S. Garp" ) = Range("A1").Value

b. Range("A1").Value = InputBox("Earthling Name Retrieval", "Give me your name, Earthling!" , "T.S. Garp")

c. InputBox("Earthling Name Retrieval" , "Give me your name, Earthling!" , "T.S. Garp") = Range("A1").Value

d. Range("A1").Value = InputBox("Give me your name, Earthling!" , "Earthling Name Retrieval" , "T.S. Garp").

Reference no: EM1347527

Questions Cloud

Find the factors that affect afn : Estimate effects of each of factors listed by itself and place a check next to every factor that is likely to increase a company requirement for external capital.
Motivation and work learning : Show the purposes of conducting performance appraisals. What are the benefits of 360-degree feedback and have you participated in 360-degree feedback? Explain.
Eric kurtz worries about joyce performance : Evaluate whether the individuals will be motivated to behave as desired and then select the appropriate managerial action from those listed.
Explain how much do you believe will be the budget share : Assume after 10 years real consumer spending doubles to 100. Explain how much do you believe will be the budget share of leisure.
Button subprocedure to store user-s name in cell : If you wish to take in and store user's name in cell A1 by having them type their name following prompt declaring "Give me your name, Earthling!" that code excerpt must you use within button subprocedure?
Cost volume relationship : With possibility that the US Congress will relax restrictions on cutting old growth, a local lumber company is considering expanding its facilities. They can sell the lumber for .18 a board foot. The tax rate for company is 30%. The company has th..
Google business operation strategy : Synthesize the product, vertical and geographical scope of Google's endeavors and evaluate the effectiveness of their corporate strategy in creating value
Illustrate what would shoppers see when they shopped : Illustrate what would shoppers see when they shopped in Wal-Mart and the other "big box" stores that sell so many imported items
Find the energy of the electromagnetic radiation : A spring with spring constant 13 N/m hangs from the ceiling. A ball is attached to the spring and allowed to come to rest. It is then pulled down 8.5cm and free. The ball makes 26 oscillations in 18 s seconds.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Explaining parse tree n-m nodes

W has derivation of m steps, show that w has a parse tree n+m nodes.

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

  Relative risk comes form inside the organisation

Write a report on relative risk that comes form inside organisation as opposed to risk which comes from external sources.

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Descriptions of data formats and to interpret raw data

The aim of this project is to exercise and test your ability to read and understand descriptions of data formats and to interpret raw data according to a particular format.  In this exercise you will produce and read the dump of a ZIP file.

  Determine the actual bits sent by the sender

Determine the actual bits sent by the sender? Include some idleness bits before and after the frame. Let bit-stuffing (also known as bit-insertion).

  Four ring architecture of operating systems

Opinion regarding what security benefit(s) would be seen if modern operating systems followed four ring architecture.

  Explaining options to begin troubleshooting

Which two options should you use to begin troubleshooting?

  Compare and contrast the in terms of cores/microprocessors

Compare and contrast the following, in terms of cores (or microprocessors), random access memory (RAM), disk storage, and networking capabilities.

  Explaining social engineering attack

Study a social engineering attack. What made this attack successful?

  How lseek call makes a seek to file

Where lseek call makes a seek to byte 3 of file. What does buffer comprise after the read has completed?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd