1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeTakaya
2 years ago
11

Question 5 / 15

Computers and Technology
2 answers:
inysia [295]2 years ago
8 0

Answer:

$1,020 that is my answer because it will be that one

erastova [34]2 years ago
7 0

The value that would be returned based on the formula [=COUNTIF(A43:A47, "NP*")] in cell A49 is 4.

Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., so as to avail its end users the ability to analyze and visualize spreadsheet documents.

In Microsoft Excel, there are different types of functions (predefined formulas) and these include:

  • Sum function
  • Average function
  • Minimum function
  • Maximum function
  • Count function

A count function is typically used to to calculate the number of entries in a cell or number field that meets a specific (predefined) value set by an end user.

In this scenario, "NP*" is the specific (predefined) value that was set and as such the value that would be returned based on the formula in cell A49 is 4 because A43, A44, A45 and A46 contain the value "NP."

Read more on Excel formula here: brainly.com/question/25219289

You might be interested in
Discuss five processes for analyzing a qualitative study
xxMikexx [17]

1. Prepare and organize your data.

Print out your transcripts, gather your notes, documents, or other materials. Mark the source, any demographics you may have collected, or any other information that will help you analyze your data.

2. Review and explore the data.

This will require you to read your data, probably several times, to get a sense of what it contains. You may want to keep notes about your thoughts, ideas, or any questions you have.

3. Create initial codes.

Use highlighters, notes in the margins, sticky pads, concept maps, or anything else that helps you to connect with your data. See the attached document that demonstrates how one might highlight key words and phrases as well as make notes in the margins to categorize the data:

4. Review those codes and revise or combine into themes.

Identify recurring themes, language, opinions, and beliefs.

5. Present themes in a cohesive manner.

Consider your audience, the purpose of the study, and what content should be included to best tell the story of your data.

Hope this helped you!!!

4 0
3 years ago
Read 2 more answers
Which of the following statements is true?
USPshnik [31]

Answer: (A) Computer science trends to deal with the data.

Explanation:

 The computer science basically tend to deal with the big data and data science as it is the emerging technologies with the upcoming years.

As, with the large amount of the data and high transmission rate we can easily developed new computing technologies with low budget.  

Data is basically defined as simple facts and figures and contain information that is very useful for developing the computing technology for study and processing the system.

Therefore, Option (A) is correct.

 

8 0
3 years ago
1. Write down the differences between a ‘good’ slide and a ‘bad’ slide.
Citrus2011 [14]
Green then purple green yellow yellow red red blue red red white white blue red blue yellow red white thx you gor the point
7 0
3 years ago
Which of the following techniques is used with a state of nature of uncertainty? A. Decision tree B. Laplace C. Break-even analy
miss Akunina [59]

Answer:

A)

Explanation:

7 0
3 years ago
Which type of hacker represents the highest risk to your computer?
Deffense [45]

Answer:

The hacker which represents the highest risk to my computer is the Script Kiddie.

Explanation:

A Script Kiddie cannot make their own programs.

They hack by using existing codes, scripts, web shells etc to access a work station, mutilate webpages etc.

The difference between a Hacker and a Script Kiddie is that a hacker does not need another person's code. They are skilled at writing their own codes which are can be very potent. This level of skill can be difficult to attain except for very bright minds.

The script kid needs very little knowledge of scripts and they are well on their way to causing damage.

Cheers!

4 0
3 years ago
Other questions:
  • - The __________ is called a single-selection statement.
    10·1 answer
  • Question 3 / 5
    9·1 answer
  • Tricia needs to tell her browser how to display a web page. What will she need to use? Compiler
    8·1 answer
  • What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
    10·2 answers
  • Simplify the expression 7(2y + 1) + 3y
    10·2 answers
  • How do you chose a profile pic on brainly?
    8·1 answer
  • Identify the parts of it, Give at least three web browser that you usually used to visit a website.​
    10·1 answer
  • Why do we need to learn about engineering and technology?
    6·1 answer
  • Explain the role of ANY TWO components of the CPU
    8·1 answer
  • Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!