1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeTakaya
1 year ago
11

Question 5 / 15

Computers and Technology
2 answers:
inysia [295]1 year ago
8 0

Answer:

$1,020 that is my answer because it will be that one

erastova [34]1 year ago
7 0

The value that would be returned based on the formula [=COUNTIF(A43:A47, "NP*")] in cell A49 is 4.

Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., so as to avail its end users the ability to analyze and visualize spreadsheet documents.

In Microsoft Excel, there are different types of functions (predefined formulas) and these include:

  • Sum function
  • Average function
  • Minimum function
  • Maximum function
  • Count function

A count function is typically used to to calculate the number of entries in a cell or number field that meets a specific (predefined) value set by an end user.

In this scenario, "NP*" is the specific (predefined) value that was set and as such the value that would be returned based on the formula in cell A49 is 4 because A43, A44, A45 and A46 contain the value "NP."

Read more on Excel formula here: brainly.com/question/25219289

You might be interested in
Which of these are branches of anthropology?
Lesechka [4]

The answer to "Which of these are branches of anthropology" is C... All of the above.

6 0
3 years ago
Read 2 more answers
__________ is the most refined and restrictive service model. a) IaaS b) CaaS c) PaaS
7nadin3 [17]

Answer:

c) PaaS

Explanation:

Refined and restrictive service model allows the user to use full package of application stack as demand by the service. It should be noted that "PaaS" is the most refined and restrictive service model.

Platform as a Service known as (PaaS ) is computing platform that gives room for the user in the cloud to manage applications.

PaaS helps to overcome the problem in managing the complexity of software licence. Example of PaaS are window Azure,Apache Stratos.

4 0
2 years ago
Which of the following statements is most true? A user's online identities, actions, and relationships rarely have consequences
ale4655 [162]

Answer:

Online activities are increasingly used to make real-world decisions.

Explanation:

People use increasingly <em>world wide web</em>. They create profiles and communicate with others on social networks, share thoughts and moments of their life on online platforms.

These <em>online</em> activities become part of one's identity. Therefore these activities can give information about user's behaviors, attitudes, likes and dislikes.

All this data are being used to make real world decisions about a user or a group of users. For example, trough one's online check-ins, frequently used location of the users or can be determined. Similarly, trough social media likes or posts, one's hobbies can be predicted.

Therefore, social media and online presence in general, is not necessarily safe or private but important places which have valuable information of the users that can be used in real world.

8 0
3 years ago
Which troubleshooting utility allows generating DNS request messages and transmitting them to specific DNS servers on the networ
olasank [31]

Answer:

nslookup

Explanation:

Which troubleshooting utility allows you to generate DNS request messages and transmit them to specific DNS servers on the network?

ans -nslookup

4 0
2 years ago
A security operations team was alerted to abnormal DNS activity coming from a user's machine. The team performed a forensic inve
Damm [24]

Answer:

D. Data exfiltration

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, data exfiltration, etc.

The type of attack in this scenario is best described as data exfiltration.

Data exfiltration can be defined as a form of data security breach that typically involves an unauthorized transfer of data from a host computer by using a malware and a malicious code.

Hence, data exfiltration occurs when a malicious code uses a domain name server (DNS) as a tunnel to extract data from an end user's computer (client machine) and transferring it to an unsecure public Internet site.

5 0
2 years ago
Other questions:
  • Jim has excellent oral and written communication skills. He enjoys public speaking and wants a job in which he will interact wit
    10·2 answers
  • for which is a chart legend used? a.all of the time b.whenever you are comparing data that is the same c.whenever you are compar
    9·2 answers
  • You view a portion of a document on the screen through a ____.
    6·1 answer
  • The expectations I would discuss with Erica regarding the usage of the internet
    6·1 answer
  • You have been hired by Beta Airlines to help them with their flight prices. You are to create a 10 x 10 2D array (also called a
    10·1 answer
  • Why computer process faster than humans?​
    10·2 answers
  • Explain the difference between true north and magnetic north.
    9·1 answer
  • What are the odds that you find someone you know in person on here
    5·1 answer
  • What is the answer only right answers<br>​
    7·2 answers
  • after teaching a group of students about measuring systems and drug calculations, the instructor determines that the teaching wa
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!