In MS Excel, a function is written as =FUNCTION_NAME(_____________________).​

Answers

Answer 1

Explanation:

A function is a predefined formula that performs calculations using specific values in a particular order. All spreadsheet programs include common functions that can be used for quickly finding the sum, average, count, maximum value, and minimum value for a range of cells. In order to use functions correctly, you'll need to understand the different parts of a function and how to create arguments to calculate values and cell references.


Related Questions

Write code that declares variables to represent a user’s hourly rate of pay and the
number of hours worked.
Assign appropriate values to the variables, then calculate and display the user’s gross
pay for a week, the withholding tax (15% of gross pay), and the net pay (gross pay –
withholding). An example output would be:
Gross Pay: 1500
Withholding Tax: 225
Net Pay: 1275

c# language

Answers

The code for the given command is:

hrs = input("Enter Hours:")

h = float(hrs)

ret = input("Enter rate per hour:")

rate = float(ret)

p = computepay(h, rate)

print("Pay", p)

The above code asks the user for input of hourly pay rate and the number of hours worked and prints the output after making the necessary computations.

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

allows users to enter text and control the computer with their voice.

Answers

Speech input software allows users to enter text and control the computer with their voice.

What is an input device that allows you to put text into a computer?

An example of these input device is the keyboard and it is one that allows a person to be able to enter letters, numbers and any kind of symbols into a computer.

Note that Speech input software allows users to enter text and control the computer with their voice.

Learn more about The keyboard from

https://brainly.com/question/26632484

#SPJ1

when you use the predict step in the IPDE process you

Answers

If a person use the predict step in the IPDE process, you  are known to judge where possible points of conflict any take place.

Why using the IPDE process?

This is known to be Identify, Predict, Decide, and Execute.

The IPDE is regarded as a strategy that a person can make use of in off-road driving and as such, If a person use the predict step in the IPDE process, you  are known to judge where possible points of conflict any take place.

Learn more about IPDE from

https://brainly.com/question/2497669

#SPJ1

What is the term used to describe a singular container in an Excel spreadsheet?
O worksheet
Otab
Ocell
Orange

Answers

Cell is the term used to describe a singular container in an Excel.

What is a single box in a spreadsheet?

An active cell as seen in an Excel worksheet, is one which is made up of small rectangle or box called cell.

Note that the active cell is one that has the selected cell and it is where the data is entered if a person begin typing.

Hence, Cell is the term used to describe a singular container in an Excel.

Learn more about spreadsheet from

https://brainly.com/question/4965119

#SPJ1

Answer:

it is d

Explanation:

The ACME Online Store offers different preferred customer discounts for customers who are "None", "Bronze", "Silver" and "Gold".

The variable customer_category is a string that is one of these 4 values.

0 for "None"
5 for "Bronze"
10 for "Silver"
20 for "Gold"
Your colleague wrote the following program (Program C). Does the program that he/she wrote have the correct logic to assign the correct discount for each of the 4 valid values of customer_category?

Program C:

if customer_category == "None":

discount = 0

if customer_category == "Bronze":

discount = 5

if customer_category == "Silver":

discount = 10

if customer_category == "Gold":

discount = 20

Answers

Yes, the written program has the correct logic to assign the correct discount for each of the 4 valid values of customer_category

What is a Program?

This refers to the sequence of instructions that are keyed into a computer to execute user-specific commands.

Hence, we can see that based on the variable customer_category that has a string that is one of these 4 values:

0 for "None"

5 for "Bronze"

10 for "Silver"

20 for "Gold"

The program uses the correct syntax as it gives the correct discount based on the assigned values of the variable customer_category as executed with the syntax above.

Read more about programs here:

https://brainly.com/question/1538272

#SPJ1

A/An ____ is a picture that shows the information that is created, stored, and used by a business system. normalization, entity relationship diagram, data flow diagram, data model​

Answers

Answer:

entity relationship diagram ( ERD)

When using sftp to share files, what is encrypted in addition to the authentification information?.

Answers

In addition to the authentification information, the data files are encrypted when using SFTP to share files.

What is SFTP?

SFTP is an abbreviation for SSH File Transfer Protocol and it can be defined as a type of secured file transfer protocol that's designed and developed to run over the SSH protocol by supporting full security and authentication, file management, as well as sharing files between two or more users on an active computer network.

This ultimately implies that, SSH File Transfer Protocol can be used for file management, file transfer and provide end users with full security and authenticated file access.

In conclusion, we can infer and logically deduce that in addition to the authentification information, the data files are encrypted when using SSH File Transfer Protocol (SFTP) to share files.

Read more on file transfer here: brainly.com/question/20602197

#SPJ1

what is the importance of Microsoft word in our everyday lives?​

Answers

Answer:

Allows us to create business documents.Helps to design and create cards, brochures, new letters etc. for business.Benefits teachers and students in developing innovative teaching and learning methods.Microsoft word is an important application for the purpose of education.It also helps in making notes instead of using notebooks.Ms Word also helps in making notes having graphs, charts, diagrams, tables etc.

dentify the benefits of workplace diversity. Select all that apply.

The Americans with Disabilities Act (ADA) is a federal law that states employers must do which of the following for workers with disabilities?
right: provide reasonable job accommodations
wrong: hire disabled workers
wrong: make job accommodations no matter the cost

Im asking a question cuz i couldnt find the answer in brainly. for anyone who needs it

Answers

Answer:

A is the answer

Explanation:

Because I just did it.

Have a good day.

def rectangle_area(base,height):
area =base * height
return area


print("The area is ", rectanle_area(5,6))

ive been typing theabove in my answer but it still say "NOT QUITE"

Answers

Using the computer language in python to write a function code that calculates the area of ​​a rectangle.

Writting the code in python:

def rectangle_area(base, height):

z = base*height  # the area is base*height

print("The area is " + str(z))

rectangle_area(5,6)

See more about python at brainly.com/question/18502436

#SPJ1

I need help with my work

Answers

Answer:

totally

awesome

Explanation:

You can evaluate the expressions in the statements by hand:

if (a*b!=c) evaluates to

if (2*3 != 11)

if (6 != 11)

if (true)

so the next line is executed (it prints 'totally')

Likewise, the other if statement also evaluates to true.

Drag the tiles to the correct boxes to complete the pairs.
Match each computer field with its appropriate description.
Tiles
information support and services
network systems
programming and software development
web and digital communications
Pairs
creating interactive materials
arrowBoth
providing technical assistance to users
arrowBoth
designing and developing applications
for an organization's use
arrowBoth
developing and implementing an
organization's technology infrastructure
arrowBoth

Answers

The matchup are:

information support and services - providing technical assistance to usersnetwork systems - creating interactive materialsprogramming and software development - designing and developing applications for an organization's useweb and digital communications -developing and implementing anorganization's technology infrastructure

What is network system?

A network is known to be made up of a set of computers, servers, network devices, and other devices that are linked so that it can allow data sharing.

Therefore, The matchup are:

information support and services - providing technical assistance to usersnetwork systems - creating interactive materialsprogramming and software development - designing and developing applications for an organization's useweb and digital communications -developing and implementing anorganization's technology infrastructure

Learn more about network systems from

https://brainly.com/question/1326000

#SPJ1

Firework: tool to design UX

Perl: programming language

Flash: software to design UI

Oracle: database software

Why should we learn Ethereum? Explain.

Answers

Answer:

Ethereum BenefitsIt has a large and committed global community and the largest ecosystem in blockchain and cryptocurrency. Wide range of functions. Besides being used as a digital currency, Ethereum can also process other financial transactions, execute smart contracts and store data for third-party applications.

Explanation:

Hope this helps and mark as a brianliest

Write a while loop that prints user_num divided by 2 until user_num is less than 1

Answers

Explanation:

The required function in python is written as follows :

user_num = int(input())

#takes an input value and convert to an integer value.

while user_num >= 1 :

#While loops is conditioned to run if user_num is ≥ 1

user_ num = user_num / 2

#divide user_num by 2 and store the result as user_num

print(user_num)

#print user_num

The while loop condition does most of the work here, The while loops is conditioned to run the divison of user_num if the value of user_num is greater than or equal to 1 ; if user_num is lesser than 1, the loop terminates.

Lear more : brainly.com/question/15170131

laminiaduo7 and 9 more users found this answer helpful

THANKS

1

1.5

(8 votes)

Unlocked badge showing two hands making the shape of heart over a pink circle

Found this answer helpful? Say thanks and unlock a badge.

Advertisement

Answer

author link

teobguan2019

Ambitious

613 answers

1.2M people helped

Answer:

user_num = float(input("Enter a number: "))

while(user_num > 1):

user_num = user_num / 2

print(user_num)

Explanation:

Line 1:

Use built-in function input() to prompt user input a number and assign it to the variable user_num.

Since the default data type of the user input is a string, we need to convert it into float data type before assigning it to user_num. We can do the data type conversion by enclosing the user input into the built-in function float().

Line 3:

Create a while loop by setting condition while user_num bigger than 1, the line 4 & 5 should keep running.

Line 4:

Divide user_num by 2 and assign the division result back to the user_num.

Line 5:

Display updated value of user_num using built-in function print()

Which of the following should you do when accepting constructive criticism? (choose all that apply)
right: show a positive facial expression
right: maintain eye contact
wrong: interrupt and question the person frequently
right: do not interrupt or speak until you are sure the other person is finished making a point
wrong: cross your arms in front of your chest

I couldnt find the answer on brainly so i putted as a question for who needs it on brainly.

Answers

Maintain eye contact, maintain a cheerful facial expression, and wait to talk until the other person has completed delivering their argument.

Which of the following terms best encapsulates the moral standards that guide an individual's or a group's actions?

Introduction: The moral principles that direct a person's behaviour are known as ethics. Everyday decisions on how to respond to events, both personal and professional, are influenced by our sense of ethics.

What exactly does work ethics entail?

Work ethic is a principle based on diligence and hard labour. It also involves a conviction that work has moral value and can develop good character. The Protestant commitment to hard work is one instance. A work ethic could include of  being reliable, having initiative, or pursuing new skills.

To know more about delivering visit:-

https://brainly.com/question/30645383

#SPJ1

What is an index? What are the advantages and disadvantages of using indexes? How do you use SQL to create an index?

Answers

Answer:

In DBMS, an index is a physical structure that stores the values for a specific column in a table. An index can be used to extract specific information from data and access records within a table more quickly without having to scan the whole table.

An Index can be made up of one or more columns of a table and each index maintains a list of values within that field that are sorted in ascending or descending order. Indexes cannot be seen by the users, but they are just used to speed up the queries and improve the performance of a database application

Careers and information technology deal with

Answers

Answer:

computers and telecommunications

Explanation:

Question 1 of 25
How can you best protect your network from web-based malware?
A. By setting up web filtering software to keep users from accessing
questionable sites
B. By using strong passwords to keep malware from attacking your
network resources
C. By installing software updates that include patches created to fix
security flaws
D. By running regular backups on all network resources

Answers

Answer:

Keep your computer and software updated. ...

Use a non-administrator account whenever possible. ...

Think twice before clicking links or downloading anything. ...

Be careful about opening email attachments or images. ...

Don't trust pop-up windows that ask you to download software. ...

Limit your file-sharing.

Write the SQL commands to obtain the following information from the system catalog:

List every table that you created.
List every field in the Client table and its associated data type.
List every table that contains a field named TaskID.

Answers

The SQL commands to obtain the information from the system catalog is illustrated below.

How to illustrate the the SQL commands?

It should be noted that SQL commands are instructions to communicate with a database to perform a task.

List every table that you created. - SHOW TABLES

List every field in the Client table and its associated data type. - SHOW COLUMNS FROM CUSTOMER

List every table that contains a field named TaskID. - SELECT TBNAME FROM SYSCOLUMNS WHERE COLNAME = 'TaskID'

Learn more about SQL on:

brainly.com/question/25694408

#SPJ1

You are given a list of N integers . find the largest sum of a continuous sequence from the given list

Answers

Explanation:

di5ditdi5suufsutydskydjgsukstralurilttdljstp7hzpgxuptdoyd

What does it mean when someone says your voice doesn’t match how u look

Answers

Explanation:

it means that your voice it doesn't match with your personality like 2 characteristics by voice and by personality

can the charger of my laptop get infected with viruses also when it was connected to it?​

Answers

Answer:

Technically… yes. Because if the charging port is the same as a USB/etc connector port, then it can travel over that.

Explanation:



A mathematics question paper has certain number of questions and each question is
assigned some random maximum marks. Mr. Myers wants to edit the marks assigned
to the questions such that:
1. All questions in the paper should have distinct maximum marks.
2. The total marks of all the questions should be as low as possible.
Mr. Myers wants to achieve this by making minimal changes in the original format,
assigning the question at least as much marks as it originally had. Find the minimum
total marks that he can set the paper for.
Input Specification:

Answers

Using the knowledge in computional language in Java it is possible to write a code that can edit the marks assigned for Mr. Myers:

Writting the code in Java:

#include <stdio.h>

int main()

{

   int n, i, sum=0;

   int a[i];

   printf("Enter the number of Questions in the paper : ");

   scanf("%d", &n);

   printf("Original marks assigned to every question :");

   for(i=0; i<n; i++)

   {

       scanf("%d", &a[i]);

   }

   for(i=0; i<n; i++)

   {

       sum += a[i];

   }

   printf("The minimum total marks Mr. myers can set the paper for. : %d", sum);

   return 0;

}

The minimum total marks that Mr. Myers can set the paper for is 15.

See more about computing at: brainly.com/question/15707178

#SPJ1

What is referential integrity

Answers

The association between tables is referred to as referential integrity. A primary key is required for each table in a database and can appear in other tables as a result of its connection to the data in those other tables. Foreign keys are used when a primary key from one table appears in another table.

by default which service accounts will windows powershell cmdlets manage

Answers

By default, the service accounts which Windows PowerShell cmdlets will manage are group MSAs.

What is a cmdlet?

A cmdlet is abbreviation for command let and it can be defined as a lightweight and native PowerShell command that is designed and developed to be used by an administrator (end user) within the PowerShell environment of a Windows computer system.

In Computer technology, the PowerShell runtime is saddled with the responsibility of invoking these Windows PowerShell cmdlets based on the automation scripts that are provided by an administrator (end user) at the command line.

In this context, we can infer and logically deduce that by default, the service accounts which Windows PowerShell cmdlets will manage are group MSAs.

Read more on PowerShell cmdlets here: https://brainly.com/question/10674913

#SPJ1

Assume that x ransomware is currently pandemic. Explain your way to protect your systems (PCs or servers) from x ransomware without service interruption

Answers

Let's check the precautions

Use MFA

MFA stands for multi factor authenticationThis is the complicated edition of general two step authentications we do on regular basis

Use strong passwords

Never use 1234.. or any easy passwords like your name,no etc

Always patch early

Try to patch on rare basis

Use VPN

Turn off your RDP if you don't need right then

what is the benefit of Agile?

Answers

Answer:

The benefits of algae is I also don't know .I as also going to ask thanks for point

Think back to your early days of education—what role did technology play? Now ask a parent/guardian/older family member what role technology played in their education. Discuss the difference between your experience and this older family member’s experience with technology in education. Which do you think created a better learning experience?

Answers

The first use of technology in education is one that is seen in the invention of the use of  abacus for calculations such as addition, subtraction, multiplication, and division.

Note that schools were said to slowly create a curriculum where the subjects which are seen as most vital were taught.

By the mid-1600s, the invention of the modern library and the pencil were brought up, starting the first et of educational technology.

How has technology played a role in education?

It is one that has helped a lot of students to be able to look out or search for new subjects and broaden their understanding of a lot of hard concepts, such as STEM.

Note that The first use of technology in education is one that is seen in the invention of the use of  abacus for calculations such as addition, subtraction, multiplication, and division.

Learn more about technology from

https://brainly.com/question/25110079

#SPJ1

Question 3 (5 points) ✔ Saved Janice is scrolling through her feed one day and notices that Abby said some awful things about Patricia. Janice thinks that what Abby is doing to Patricia is wrong, but she decides to log out of her account and ignore the cyberbullying. In this situation, Janice is a/an cyberbully. O advocate. O Internet troll. O bystander.​

Answers

Since Janice did ignore the cyberbullying, one can say that she is a  bystander.​

Who is a bystander?

The term connote a person that is said to be a nonparticipant spectator and in this case the person will do nothing even if someone is been killed in their presence.

Hence, Since Janice did ignore the cyberbullying, one can say that she is a  bystander.​

Learn more about bystander from

https://brainly.com/question/8516593

#SPJ1

In this situation, Janice is considered as a: D. bystander.

Who is a bystander?

A bystander can be defined as an individual that physically witnesses bullying or cyberbullying in digital forms such as social media, websites, and software applications.

In this context, we can infer and logically deduce that Janice is considered as a bystander because she witnessed how Abby said some awful things about Patricia.

Read more on bystander here: https://brainly.com/question/8516593

#SPJ1

Convert 105 decimal to 128 binary form

Answers

Answer:

1101001 is binary 105

128 in binary is 10000000

Other Questions
Why is motif used in poetry? What are 3 important facts about Martin Luther King? Does the differential heating of Earth's surface cause wind on a global scale? A string of length L = 2.2 m and mass m = 0.035 kg is fixed between two stationary points, and when the string is played a transverse wave of frequency f = 94 Hz is generated. The wave is vibrating in an unknown harmonic.a. If the wavelength is 10.0 cm, which harmonic is this, counting the fundamental as 1?b. For the case described in Part (a), what is the tension in N? find the length of the hypotenuse if both legs of the right triangle are 3 Octagon Towers is an octagon-shaped condominium building in Miami, Florida. Assuming the base of Octagon Towers is a regular octagon, find the measure of each interior angle of the base of Octagon Towers. Each interior angle measures ? An author claims that internet usage and screen time for teens should remain the same. They provide the following reason as support:An awesome article in Kids Love Phones Magazine says there is no harm in spending all day on your phone, computer, or tablet. I completely agree! It would be heartbreaking for kids to give up something they love. It is a silly idea that grownups thought up to make themselves look smart. We do not deserve to be punished!Which choice describes the support the author provides? It is effective. It supports the claim clearly and logically with evidence. It is emotional. It expresses personal feelings that cannot be backed with research. It is irrelevant. It discusses a fact that is off topic and does not support the claim. It is unverified. It does not cite a source to show where the information was found.pls anwser quick The most efficient way to memorize multiple layers of information all at once is to use flashcards. please select the best answer from the choices provided true false 5Give the coordinates of the point obtained from each reflection.(a) Reflect the point (0, 3) across the X-axis:(b) Reflect the point (0, 3) across the y-axis:0-DODX What is Prufrock thinking of at the end of the poem? When graphing a linear function in slope intercept form, why do you have to plot the y-intercept first? Why car't you use the slope first? Math The cells in the image are drawn here as cubes to represent their volume to surface area. Which cell would be the LEAST efficient at maintaining homeostasis? A, D - it will take too long to exchange gasesB, D - it will be able to carry out fewer cell processes in the larger spaceC, A - it will be able exchange gases quicklyD, A - it will loose nutrients too fast 4. Which two sentences from the text best support the correct answer to question 3?A. "And so we, the Jews of Sighet, waited for better days that surely were soon to come." (paragraph 18)B. "It was a year like so many others, with its spring, its engagements, its weddings, and its births." (paragraph22)IC. "They never demanded the impossible, made no offensive remarks, and sometimes even smiled at the lady ofthe house." (paragraph 36)D. "People gathered in private homes: no need to provoke the Germans." (paragraph 39)E. "The barbed wire that encircled us like a wall did not fill us with real fear." (paragraph 56)F. "We would live among Jews, among brothers..." (paragraph 57) Use the properties of exponents to simplify the expression. (y3/2 x -1/2)^4 Math on the Spot Lena wantsto put the elephant stickers inan album. She says she will usemore pages if she puts 5 stickerson a page instead of 10 stickerson a page. Is she correct?Explain. How many atoms are in 0.540 moles of sodium? If a photon has a frequency of 5.20 x 1014 hertz, what is the energy of the photon? Given : Planks constant is 6.63 x 10 -34 joule.seconds Describe your favorite stage performance. What did you enjoy about it?Or:What play or Broadway show would you like to see performed, and why? How many hours is part time? roberto is building a rainbow for the set of the school play. he draws the sketch shown to find the amount of paint he needs to make the rainbow. he says he needs to buy enough green paint to cover at least 15.7 square feet.