1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elina [12.6K]
2 years ago
11

I am trying to sum up a set of data based on 2 criteria (needs to have "green" in column E, and "January 2020" in collum A). Col

umn D is the set of numbers I need to add. I am getting "Error, array arguments in SUMIFS are of different size.
Computers and Technology
1 answer:
trasher [3.6K]2 years ago
7 0

In summing the set of data using the 2 criteria, the best way to do it is to avoid the error is that On cell G16, one should type the formula "=SUMIF(G2:G11, ">=40")".

<h3>What is the code about?</h3>

In computing, Formulas seen  In Microsoft Excel are known to be employed to be able to generate some outcome or values to any cell.

Note that the formula need to begin with an equal sign. The formula that is written above has the function "SUMIF" that helps to give the  sum of numeric values as a result of the condition.

Learn more about  SUMIFS from

brainly.com/question/19595606

#SPJ1

You might be interested in
I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
liq [111]
The number of bullet points on a slide should not exceed till 8
3 0
3 years ago
Which encryption standard uses Advanced Encryption Standard (AES), a 128-bit block cipher that is much tougher to crack than the
Alchen [17]

Answer:

Wi-Fi Protected Access 2 (WPA2)

Explanation:

The Wi-Fi Protected Access 2 (WPA2) makes some alterations to the encryption algorithm that were used in WPA and WEP to what is known as the  Advanced Encryption Standard (AES). This is a 128-bit block cipher considered to be much more difficult to crack than the usual 128-bit TKIP wrapper. However, although WPA2 offers a much more tougher encryption standard, it is important to note that it is not hack proof.

5 0
3 years ago
Researchers conducted a 'natural experiment' to examine the effects of on-site food services on weight gain among first-year col
anygoal [31]

Answer:

On-site food services is the INDEPENDENT variable and the weight gain is the DEPENDENT variable

Explanation:

Variables can be dependent or independent. An independent variable is the one used by the researcher to test its degree of influence on the dependent variable. The dependent variable, as the name implies, relies on changes in the independent variable to effect its own changes.

In the question, it is obvious that weight gain among the first year students is dependent on on-site food services

7 0
3 years ago
Which programming language uses objects? C++ ALGOL Pascal BASIC
svetlana [45]

Answer:

C++

Explanation:

I am a c++ dev

7 0
3 years ago
Read 2 more answers
__________ has remained a dominant communication tool, despite the rise in use of newer, alternative media options for message d
maksim [4K]

Answer: E-mails

Explanation:

 An E-mails is one of the type of digital message and also known as the dominant communication tool which is used for in the form of document in an organization where we can used it in different ways are as follows:

  • Communicating with other employees related to rules and regulations of an organization
  • Making various types of recommendations
  • Used for an inquiry purpose
  • providing various types of current status and new updates

According to the given question, Emails is one of the type of tool that is used as the communication medium and it is one of the flexible message delivery options which is widely used by an organizations.

 

6 0
3 years ago
Other questions:
  • Ana works in the medical records department at a large medical office. Her job includes scanning and uploading medical records i
    15·1 answer
  • How does virtualization factor into a layered vs. non-layered design discussion?
    14·2 answers
  • As a prospective student, what is the best reason to request an interview with your college application?
    6·1 answer
  • What constructs break or bend the normal Syntax patterns of scheme?
    15·1 answer
  • How would you delete a slide from your presentation after selecting it?
    14·1 answer
  • What kinds of new input devices do you think might be invented in 10, 20, or 50 years? How might those devices change the world?
    9·1 answer
  • What are hardware and software?<br><br><br><br> WILL MARK BRAINIEST
    9·2 answers
  • Which insert image option allows a user to compile, modify, and add captions to images?
    5·2 answers
  • The other term for template document is _______.
    13·2 answers
  • One common command-line network utility tool is “netstat,” which displays which protocol is being used. It can review particular
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!