Of the following is correct syntax in excel ____? 

a) REPLACE (old-text, num-chars, Start-num, New-text) b) REPLACE (old-text, Start-num, num-chars, New-text) c) REPLACE (old-text, New-text, num-chars, Start-num) d) REPLACE (num-chars, Start-num, old-text, New-text)

1 Answer

Answer :

Of the following is correct syntax in excel REPLACE (old-text, Start-num, num-chars, New-text)

Related questions

Description : Of the following, ____ is different from the group.  a) Windows b) MS-Word c) MS-Excel d) MS-PowerPoint

Last Answer : Of the following, ____ is different from the group.  a) Windows b) MS-Word c) MS-Excel d) MS-PowerPoint

Description : Without the symbol '=' excel will treat the data as ____.  a) Number b) Formula c) Text d) None of the above

Last Answer : Without the symbol '=' excel will treat the data as Text.

Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned

Last Answer : d.all of the mentioned

Description : Find the odd one out A) MS -Excel B) Windows XP C) Linux D) DOS

Last Answer : Find the odd one out   MS -Excel 

Description : Which of the following is correct ____.  a) Frequency (data-array, bins array) b) Frequency (data, bins) c) Frequency (data, bins array) d) Frequency (array, bins array)

Last Answer : Which of the following is correct ____.  a) Frequency (data-array, bins array) b) Frequency (data, bins) c) Frequency (data, bins array) d) Frequency (array, bins array)

Description :  ____ is known as a computer network in which one centralized, powerful computer is a hub to which many less powerful personal computers or workstations are connected. The clients run programs and access data that ... server.  a) Client-Server network b) Extranet c) Internet d) None of the above.

Last Answer :  Client-Server network is known as a computer network in which one centralized, powerful computer is a hub to which many less powerful personal computers or workstations are connected. The clients run programs and access data that stored on the server. 

Description : Of the following, ____ would be considered as a way through which a computer virus can enter into a computer system.  a) E-mail with attachments b) Downloading the data from sites c) Operating the system without antivirus software d) All of the above

Last Answer : Of the following, ____ would be considered as a way through which a computer virus can enter into a computer system. a) E-mail with attachments b) Downloading the data from sites c) Operating the system without antivirus software d) All of the above

Description : Nano Second is the ____.  a) Millionths of a second b) Billionths of a second c) Trillionth of a second d) Thousands of a second

Last Answer : Nano Second is the Billionths of a second

Description : The device that is used to read bar codes is ____.  a) OMR b) Barcode c) MICR d) OCR

Last Answer : The device that is used to read bar codes is Barcode 

Description :  ____ are the examples of pointing devices.  a) Electronic Mouse b) Pointing Stick c)Track ball d) All of the above

Last Answer :  ____ are the examples of pointing devices.  a) Electronic Mouse b) Pointing Stick c)Track ball d) All of the above

Description :  ____ is known as unauthorized access to the system.  a) Decryption b) Encryption c) Hacking d) None of the above

Last Answer :  Hacking is known as unauthorized access to the system. 

Description : ____ is known as allowing the authorized access to information.  a) Decryption b) Encryption c) Hacking d) None of the above

Last Answer : Decryption is known as allowing the authorized access to information. 

Description :  ____ is known as restricting the access to information.  a) Decryption b) Encryption c) Hacking d) None of the above

Last Answer :  Encryption is known as restricting the access to information.

Description : A collection of related records in a database ____.  a) Field b) File c) Both (a) and (b) d) None of the above

Last Answer : A collection of related records in a database File

Description : Of the following, ____ is not a computer language. a) MS-Word b) C++ c) COBOL d) BASIC

Last Answer : Of the following, ____ is not a computer language.  a) MS-Word b) C++ c) COBOL d) BASIC

Description : The computer code for interchange of information between terminals is ____.  a) ASCII b) ACSII c) ASICI d) ASIIC

Last Answer : The computer code for interchange of information between terminals is ASCII.

Description : Web address is a unique address to identify ____ on web.  a) Browser b) Website c) Link d) All of the above

Last Answer : Web address is a unique address to identify Website on web. 

Description : False () function ____.  a) Returns the logical value of false b) Returns the logical value of true c) Returns the actual value d) None of the above

Last Answer : False () function ____.  a) Returns the logical value of false b) Returns the logical value of true c) Returns the actual value d) None of the above

Description : Among the following ____ is a logical function.  a) Average b) Count c) ABS d) AND

Last Answer : Among the following AND is a logical function.

Description : What is the shortcut key to display the 'save as' dialog box ____.  a) F8 b) F12 c) F11 d) F9

Last Answer : What is the shortcut key to display the 'save as' dialog box F12.

Description : To find text, formatting and special items ____ is the keyboard short key.  a) Ctrl+g b) Ctrl+h c) Ctrl+f d) Ctrl+a

Last Answer : To find text, formatting and special items Ctrl+f is the keyboard short key.

Description :  In a table to move to the first cell in a row, ____ is the keyboard shortcut key.  a) Alt+Tab b) Alt+Shift c) Alt+Ctrl d) Alt+Home

Last Answer :  In a table to move to the first cell in a row, Alt+Home is the keyboard shortcut key.

Description : What is the keyboard shortcut key to merge a document ____.  a) Alt+Shift+N b) Alt+Shift+O c) Alt+Shift+P d) Alt+Shift+Q

Last Answer : What is the keyboard shortcut key to merge a document Alt+Shift+N.

Description : After copying the content, how many times can you paste ____.  a) Only one time b) Two times c) Three times d) Many times

Last Answer : After copying the content, how many times can you paste Many times.

Description : The smallest unit of computerized data is referred as ____.  a) Bit b) Byte c) Both (a) and (b) d) None of the above

Last Answer : The smallest unit of computerized data is referred as Bit.

Description : Information that a computer produces and delivers back to the user is known as ____.  a) Input b) Output c) Both (a) and (b) d) None of the above

Last Answer : Information that a computer produces and delivers back to the user is known as Output.

Description : Information that is entered into a computer is called as ____.  a) Input b) Output c) Both (a) and (b) d) None of the above

Last Answer : Information that is entered into a computer is called as Input.

Description : The following ____ is termed as permanent memory.  a) Random Access Memory b) Read Only Memory c) Flash Memory d) Cache Memory

Last Answer : The following Read Only Memory is termed as permanent memory. 

Description :  ____ is the software that controls all the other software programs and allows to perform basic tasks.  a) Software b) Hardware c) Windows d) Operating System

Last Answer :  Operating System is the software that controls all the other software programs and allows to perform basic tasks. 

Description : The building block for all information that flows through a computer ____.  a) Bit b) Byte c) Both (a) and (b) d) None of the above

Last Answer : The building block for all information that flows through a computer Byte 

Description : Scanner is ____ device.  a) Input b) Output c) Both (a) and (b) d) None of the above

Last Answer : Scanner is Input device.

Description : Router is ____ device.  a) Input b) Output c) Both (a) and (b) d) None of the above

Last Answer : output

Description :  ____ is a set of instructions, also called a program that tells a computer how to perform tasks.  a) Hardware b) Software c) Both (a) and (b) d) None of the above

Last Answer : a and b because you need a keyboard or something that's hardware to get code flowing which is software

Description :  ____ is the language that computer can understand and execute.  a) Middle Level Language b) Machine Level Language c) High Level Language d) All of the above

Last Answer : the language of a computer is called all

Description : ____ is an internet based computing solution where shared resources are provided.  a) Cloud Computing b) Networking c) LAN d) None of the above

Last Answer : lan

Description :  A computer program that converts one by one instruction into a machine language is called ____.  a) Interpreter b) Simulator c) Compiler d) None of the above

Last Answer :  A computer program that converts one by one instruction into a machine language is called Interpreter.

Description : A computer program that converts an entire program into a machine language is called ____.  a) Interpreter b) Simulator c) Compiler d) None of the above

Last Answer : A computer program that converts an entire program into a machine language is called Compiler.

Description : What is meant by devoted computer ____.  a) Which uses only one kind of software b) Which is used by only one person c) Which is assigned with only one task d) No such type of computers are available

Last Answer : What is meant by devoted computer ____.  a) Which uses only one kind of software b) Which is used by only one person c) Which is assigned with only one task d) No such type of computers are available

Description : Modern computers are reliable but they don't have ____.  a) Fast b) Powerful c) Cheap d) Self thinking

Last Answer : self thinking

Description : ____ is the mode we use to execute the instruction from a computer.  a) Sequential b) Parallel c) Both (a) & (b) d) None of the above

Last Answer : ____ is the mode we use to execute the instruction from a computer.  a) Sequential b) Parallel c) Both (a) & (b) d) None of the above

Description : Any web references for correct syntax use?

Last Answer : It’s unclear whether you want this in English or Italian, but I think what you’re looking for is a reference for idioms. If you google the word, you’ll find many out there. Here’s one that has lots of examples: The Idiom Connection .

Description : What's the correct syntax for linking to an HTML page on your local C: drive from an tag in a HTML page on your desktop?

Last Answer : try using \ instead of / for starters…

Description : Choose the correct syntax to create an E_mail link. (a) -Technology

Last Answer : (b)

Description : Which one of these is correct syntax of the declaration, that defines the XML version? -Technology

Last Answer : (a) is a correct syntax of the declaration.

Description : Which of the syntax is correct for insert statement? i) insert into values ii) insert into (column list) values A) i-only B) ii-only C) Both of them D) None of them

Last Answer : C) Both of them

Description : Suppose list1 is [4, 2, 2, 4, 5, 2, 1, 0], which of the following is correct syntax for slicing operation? a) print(list1[0]) b) print(list1[:2]) c) print(list1[:-2]) d) all of the mentioned

Last Answer : d) all of the mentioned

Description : Which of the following is not the correct syntax for creating a set? a) set([[1,2],[3,4]]) b) set([1,2,2,3,4]) c) set((1,2,3,4)) d) {1,2,3,4}

Last Answer : Answer: a Explanation: The argument given for the set must be an iterable.

Description : An Assertion is a predicate expressing a condition we wish database to always satisfy. The correct syntax for Assertion is : (A) CREATE ASSERTION ‘ASSERTION Name’ CHECK ‘Predicate’ (B) CREATE ASSERTION ‘ASSERTION NAME’ (C) CREATE ASSERTION, CHECK Predicate (D) SELECT ASSERTION

Last Answer : (A) CREATE ASSERTION ‘ASSERTION Name’ CHECK ‘Predicate’ 

Description : Consider the following statements related to compiler construction: I. Lexical Analysis is specified by context-free grammars and implemented by pushdown automata. II. Syntax Analysis is specified by regular expressions and implemented by ... Only l (2) Only ll (3) Both I and II (4) Neither I nor Il

Last Answer : Answer: 4

Description : Is there a syntax or word construction plug-in for Microsoft Office Mac?

Last Answer : answer:Have you tried the grammar checker included with Word? Microsoft Office for Mac 2011 – Check spelling and grammar in a different language link