Match the spreadsheet functions to their operations.

ROUND
COUNT
MIN
MAX

-tells you how many numbers are present in a set of numbers or cell range
-trims numbers with trailing decimal digits to display only a specified number of those decimals
-tells you the lowest value in a set of numbers
-tells you the highest value in a set of numbers

Answers

Answer 1

Answer:

The match is as follows:

ROUND: -trims numbers with trailing decimal digits to display only a specified number of those decimals  

COUNT: -tells you how many numbers are present in a set of numbers or cell range  

MIN: -tells you the lowest value in a set of numbers  

MAX: -tells you the highest value in a set of numbers

Explanation:

The answers are self-explanatory. However, the usage of each function is as follows:

(a) ROUND

= ROUND(cell)

e.g, = ROUND(A1) to round up A1

(b) COUNT

= COUNT(cell range)

e.g. = COUNT(A1,A5)

(c) MIN

= MIN(cell range)

e.g. = MIN(A1,A5)

(d) MAX

= MAX(cell range)

e.g. = MAX(A1,A5)

Answer 2

Answer:

Tells you how many numbers are present in a set  of numbers or cell range - COUNT

trims numbers with trailing decimal digits to  display only a specified number of those decimals - ROUND

Tells you the lowest value in a set of numbers - MIN

Tells you the highest value in a set of numbers - MAX

Explanation:

I got it right on the Edmentum test.


Related Questions

Data inconsistency is described as A. Lack of data sharing between DBMS and Data Warehouse B. Program data dependence C. Having duplicate data in multiple files D. Lack of data sharing between similar DBMS E. Different versions of the same data appear in different places

Answers

Answer:

Having Duplicate Data in Seperate Files

Explanation:

A conflicting data set happens when managerial changes to a data set in the exchange log disagree with data kept up in the data set's setup document. A DBMS is a way this can be forestalled. I hope I helped you!

What is a named bit of programming instructions?

Answers

Answer:

Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

write a program to calculate the area of rectangle​

Answers

Answer:

program by LET statement

Explanation:

CLS

REM to find the area of rectangle

LET L=40

LET B=20

LET AOR=L*B

PRINT "AOR=";AOR

END

                                                                                         Press F5

output

AOR=800

03.05 Editing in Word
1335 Middle School Business Keyboarding / Module 03: Write with Word
1. (03.05 LC)
This tool allows you to duplicate text from one part of a document while keeping the original text. (5 points)
O Cut
O Copy
O Drag
o paste

Answers

Answer:

Copy

Explanation:

In Microsoft Word, the copy tool is located in the Home tab, within the Clipboard group along with Cut, Paste, and Format Painter tool buttons

The Copy tool can also be brought up by right clicking a selected item

The Copy tool is activated when an item is selected. When the Copy tool command is used, the text is copied while keeping the original text.

who likes video games

Answers

i wish i could play but my strict mom would never let me :’(

What is a blank workbook?

Answers

A workbook is a file that contains one or more worksheets to help you organize data. You can create a new workbook from a blank workbook or a template

pls help
urgent questions please​

Answers

Answer:

1 - CLI

2- GUI

3-CLI

4- CLI

By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:

Answers

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

A list of steps to finish a task. A set of instructions that can be performed with or without a computer is called an

Answers

Answer:

algorithm

Explanation:

A list of steps to finish a task. A set of instructions that can be performed with or without a computer is called an algorithm.

What is algorithm?

An algorithm is a method for performing calculations or finding solutions to issues. Algorithms perform as a precise set of instructions that carry out preset activities consecutively in either hardware-based or software-based routines. Algorithms play a big role in information technology across the board.

Algorithms can be found in a variety of contexts, including the way we do laundry, how we answer long division problems, what goes into baking a cake, and how search engines work.

The merge sort algorithm is one of the most important ones now in use. It is a comparison-based sorting algorithm that uses the divide-and-conquer tactic to get over an challenge. It was made by John the mathematician.

Thus, it is an algorithm.

For more information about algorithm, click here:

https://brainly.com/question/22984934

#SPJ6

The _______ is used to change the date Auto Fill option.
A. Fill Tag
B. Tag
C. Smart Fill
D. Smart Tag

Answers

I assume you are talking about Excel?. You first--enter your initial date on the first cell and click the cell with the first date to select it, then drag the fill handle.

What would be used by a business to assess how the business is working within its organization goals? O A. Information systems B. Interactivity C. Management plan D. Business analysis​

Answers

Answer:

Management plan

Explanation:

Which benefit of purchased data models provides database planning and analysis by providing a first data model, which we can use to generate specific analysis questions and concrete, not hypothetical or abstract, examples of what might be in the appropriate database

Answers

Answer:

It facilitates systems analysis.

Explanation:

Systems analysis can be described as a process of gathering and interpreting data, finding faults, and breaking down a system into its constituent parts. It is a problem-solving strategy that facilitates an improvement in the system and guarantees that all of the system's components work together in an efficient manner to achieve their goals.

Therefore, the benefit is that it facilitates systems analysis.

What space is space surrounding the area around the main subject.

Answers

Answer:

Positive space refers to the subject or areas of interest in an artwork, such as a person's face or figure in a portrait, the objects in a still life painting, or the trees in a landscape painting. Negative space is the background or the area that surrounds the subject of the work.

Explanation:

- The emptiness around and between the shapes or forms are called the negative spaces or ground. We often call it the background but it is more than that.

write a program to calculate the volume of a cylinder​

Answers

bro mark me brainliest i’m struggling with algebra 2 rn

Answer:

program by READ DATA statement

Explanation:

CLS

REm to find the volume of a cylinder

READ π , [tex]r^{2}[/tex] , h

PRINT " pie =";P

PRINT "radius =";r

PRINT "height";h

PRINT "V=";π*[tex]r^{2}[/tex]*h

DATA = 22/7 , 4, 6

END

________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.

Answers

Answer:

Premises

On-premise security refers to the hardware and software solutions that protect businesses data from outside and inside threats.

PLEASE HELP !!!! 40 POINTS BUT HELP

Write a python program to build a simple BMI calculator, where your program asks the user to input the height and the weight of the user then displays the BMI and statement stating the overall health of each user . All the data should be in variables , and no functions should be used.
The program should contain the following:
Welcome message- Display your full name, project name and give a small description on your project (definition of the BMI) [2 marks]
Variables :
height variable , input by the user [2 marks]
Weight variable , input by the user [2 marks]
Use a proper data type change function , int() or float() [2 marks]
Calculate the BMI by using the input variables of the height and the weight . [4 marks]
Display the BMI with statement based on the result of the BMI , refer to the below table [6 marks]
Critical thinking :
After running the code, don't stop the program and ask the user for a new input for a new calculation .(use loop , Break )
EXAMPLE :
Do you want to make a new calculation ? if no end the program , if yes start the code again .[2 marks]

Answers

Answer:

So in a way it is about a python calculation

A(n) ________ cloud does not free an organization from the issues associated with managing the cloud infrastructure, but it does give the organization a high degree of customizability, flexibility, and control over their data and applications. Group of answer choices

Answers

Answer:

Private.

Explanation:

The private cloud is a computing service offering a proprietary environment to a single organization. In simple terms, it is a single-tenant environment, which means that the organization (the tenant) can use it without sharing its resources with others. It is also known as internal cloud or corporate cloud.

Therefore, it is a private cloud computing system that gives the organization a great level of customizability, flexibility, and control ability over data and applications.

Thus, a private cloud is a correct answer.

what is processing for a computer?​

Answers

Answer:

is an action or series of actions that a microprocessor, also known as a central processing unit (CPU), in a computer performs when it receives information.

What is the output of the sum of 1001011 and 100011 displayed in hexadecimal?

Answers

Answer:

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]6E_{hex}[/tex]

Explanation:

Required

[tex]1001011_2 + 100011_2 = []_{16}[/tex]

First, carry out the addition in binary

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]1101110_2[/tex]

The step is as follows (start adding from right to left):

[tex]1 + 1 = 10[/tex] --- Write 0 carry 1

[tex]1 + 1 + 1(carry) = 11[/tex] ---- Write 1 carry 1

[tex]0 + 0 + 1(carry) = 1[/tex] ---- Write 1

[tex]1 + 0 = 1[/tex] --- Write 1

[tex]0 + 0 = 0[/tex] ---- Write 0

[tex]0 + 0 = 0[/tex] ---- Write 0

[tex]1 + 1 = 10[/tex] --- Write 0 carry 1

No other number to add ; So, write 1 (the last carry)

So, we have:

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]1101110_2[/tex]

Next, convert [tex]1101110_2[/tex] to base 10 using product rule

[tex]1101110_2 = 1 * 2^6 +1 * 2^5 + 0 * 2^4 + 1 * 2^3 + 1 * 2^2 + 1 * 2^1 + 0 * 2^0[/tex]

[tex]1101110_2 = 64 +32 + 0 + 8 + 4 + 2 + 0[/tex]

[tex]1101110_2 = 110_{10}[/tex]

Lastly, convert [tex]110_{10}[/tex] to hexadecimal using division and remainder rule

[tex]110/16 \to 6\ R\ 14[/tex]

[tex]6/16 \to 0\ R\ 6[/tex]

Write the remainder from bottom to top;

[tex]110_{10} = 6(14)_{hex}[/tex]

In hexadecimal

[tex]14 \to E[/tex]

So, we have:

[tex]110_{10} = 6E_{hex}[/tex]

Hence:

[tex]1001011_2[/tex]    [tex]+[/tex]   [tex]100011_2[/tex]   [tex]=[/tex]    [tex]6E_{hex}[/tex]

A two-dimensional array is essentially?
A primitive date type
A looped data structure

Answers

Answer:

A looped data structure

Explanation:

A two-dimensional array is an array of another array. You can traverse it using nested loops, one to traverse row and one to traverse columns.

Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she is only running part of the computer program. Which is she using

Answers

Answer:

breakpoints.

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Debugging and maintenance.

In this scenario, Kerry is debugging a program and identifies a line of code to begin execution and another line of code to end execution so that she is only running part of the computer program. Thus, Kerry is using breakpoints.

Basically, one of the fundamental debugging techniques used by software developers and programmers are breakpoints. They are generally set at any point where a pause debug-ger execution or an execution of a code is required based on certain conditions.

At every breakpoint address, a debug-ger temporarily stores a set of instruction and overwrites it with another special instruction.

Answer:

C for Edge

Explanation:

The mapping of a logical address to a physical address is done in hardware by the ________. A. memory address register B. memory-management-unit (MMU) C. relocation register D. dynamic loading register

Answers

Answer:

b. Memory-Management Unit

Explanation:

The hardware device called Memory-Management Unit is used for mapping logical address to its corresponding physical address.

What type of communication takes place between two individuals or parties and involves the use of encryption so that only the desired individuals have access to what is being said or heard

Answers

Answer:

private

Explanation:

Select the three careers in the creative side of digital media.

broadcasting
web designer
animators
filmmaker
project management

Answers

Answer:

I would pick A B and D to be my answer

Answer:

web designer, animators, and filmmaker.

please answer this question​

Answers

Answer:

17. True

18. Backup

Explanation:

Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.

When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.

The formula =average(B1:B2) displays the value____(see the picture down)

Answers

9514 1404 393

Answer:

  (a)  10

Explanation:

The formula displays the average of the values 8 and 12. That average is ...

  (8+12)/2 = 10

One of the key properties of the ___________ approach is that a specific concept is represented by activity that is distributed over many units in the network.

Answers

Answer:

connectionist

Explanation:

One of the key properties of a connectionist network is that a specific category is represented by activity that is distributed over many units in the network. This contrasts with semantic networks, in which specific categories are represented at individual nodes.

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next

Answers

Answer:

Obviously update the router

Explanation:

Keeping your router up to date is also a really important thing to do to protect your network from vulnerabilities. Outdated systems are easy targets for new methods of hacking.

Q3.What are the hardware requirement of the multimedia system?

Answers

Answer:

• The processing unit

• The memory

• Universal Serial Bus (USB) Device

• Graphics Card and Graphical Processing Unit (GPU)

• Hard drive

• Monitor

• External storage and optical device

which structure does a web page normally use to define an area of focus

Answers

Answer:

Grid structure

Explanation:

Other Questions
which set of anges can form a triangle hey! ill give brainliest please help The best way to start off an introductory paragraph is to state the topic in the first sentence.true or false 1. Hayes Enterprises began 2003 with a retained earnings balance of $820,000. During 2003, the firm earned $470,000 after taxes. From this amount, preferred stockholders were paid $47,000 in dividends. At year-end 2003, the firm's retained earnings totaled $1,040,000. The firm had 120,000 shares of common stock outstanding during 2003.a. Prepare a statement of retained earnings for the year ended December 31, 2003, for Hayes Enterprises. (Note: Be sure to calculate and include the amount of cash dividends paid in 2003.)b. Calculate the firm's 2003 earnings per share (EPS).c. How large a per-share cash dividend did the firm pay on common stock during 2003? What is the circumference of the circle? d=44in 3. What amendment provides "equal protection" and "due process" in the UnitedStates? list and explain one cause or reason for the following.1. Europe was on the verge of war by 1914.2. US entry into world war I3. sedition act Plz help me with these 2 questions write any six solutions for energy crisis in Nepal. When 24,000 units are produced, variable costs are $12.00 per unit. Therefore, when 18,000 units are produced ________. Group of answer choices variable unit costs will increase to $16.00 per unit variable costs will remain at $12.00 per unit variable costs will total $288,000 variable unit costs will decrease to $9.00 per unit Sydney buys a new car for $24,000 and finances the car for 5 years at 2.5% interest compounded yearly. She estimates that the value of the car will decrease by 16% each year. If Sydney is able to sell the car on the day of her last car payment for the value she estimated, how much money will she have spent over the 5 years? Part AWhat inference can be made about the jobs of the future from "President Obama's Third Annual Back to School Speech"?i need heelp A. They will require the ability to be creative.B. Jobs of the future will require a college degree.C. Jobs of the future will require scientific knowledge.D. They will require previous work experience.Question 2Part BWhich detail from the speech best supports the inference in Part A?1. Or maybe youll write the next great American novel.2. But the fact of the matter is, is that more than 60 percent of the jobs in the next decade will require more than a high school diploma -- more than 60 percent.3. I was just talking to Donae, and she wants to be an architect, and shes interning with an architectural firm, and shes already got her sights set on what school she wants to go to.4. Well be able to make sure the newest inventions and the latest breakthroughs happen right here in the United States of America. I need help answering this question I will give Brainlyiest to any one In a tension test of steel, the ultimate load was 13,100 lb and the elongation was 0.52 in. The original diameter of the specimen was 0.50 in. and the gage length was 2.00 in. Calculate (a) the ultimate tensile stress (b) the ductility of the material in terms of percent elongation The percentage of water in the human body isA. 65B. 70C. 40D. 80I have to choose from one of these Please help me with this question 10x10x10x10x10x10x10 in word form Organizational behavior focuses on ________. A. individual and group behavior as well as organizational aspects B. group behavior only C. individual behavior only D. neither group behavior nor individual behavior a cylindrical tinfull of engine oil has a diameter of 12cmand the height of 14cm.the oil is poured into a rectangular tin 16cm long and 11cm wide,what is the depth of the oil in the tin? moon problem please help!crescent moongibbous moonnew moonquarter moon