1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lutik1710 [3]
2 years ago
11

Enter the database function in cell i6 that determines the average salary of all full-time employees with at least one dependant

.
Computers and Technology
1 answer:
love history [14]2 years ago
4 0

Based on the given spreadsheet, the database function that needs to be entered into cell I6 to find the average salary of all full-time employees is =AVERAGEIFS(D5:D34,B5:B34,"FT",C5:C34,">=1")

<h3>What does the AverageIfs formula find?</h3>

You can use the AverageIfs formula to find the average of a specific group of numbers from a spreadsheet based on the shared categories that these numbers fall under.

After typing in the =AverageIfs function, you then input the range from which the category will be specified. In this case that is D5:D34. The next entry would be the range the category is picked from which is  B5:B34. The function will be FT for Full time workers.

Then use C5:C34 to find out the number of dependents that are equal to or greater than 1.

The digit returned is the average salary of all full-time employees.

Find out more on the AverageIf function at brainly.com/question/13661607

#SPJ1

You might be interested in
You cannot change data directly in the PivotTable. Instead, you must edit the Excel table, and then ____, or update, the PivotTa
Fudgin [204]

Answer:

d. refresh

Explanation:

The Excel software does not allow a user to change values/data directly in the Pivottable. You will get an error message like "Cannot change this part of a PivotTable report" when you try to type data directly.  You will have to edit the Excel Table and then refresh to reflect the updated data.

5 0
3 years ago
Read 2 more answers
An example of a(n) ____ reconnaissance attack is a user who sends SQL injections to a system in hopes of generating some type of
Elden [556K]
The answer to this question is A
7 0
2 years ago
Read 2 more answers
Classify each of the cost items (a-h) into one of the business functions of the value chain Cost Item Value Chain Business Funct
rewona [7]

Answer:

Explanation:

a)In this process, the power, electricity, water, etc consumed by the Production department are assembled.

b)In this department, the products are processed and shipped to the retail customers. The costs required for shipping the Latitude line of products comes under the Distribution department.

c)The activities like planning, designing, white box and black box testing are done in the Design process of a product.

d. Salary of computer scientist working on the next generation of servers related to Development.

e. Cost of Dell employees' visit to a major customer to demonstrate Dell?s ability to interconnect with other computers related to Customer Service or Marketing.

f)The cost required for testing the products comes under the Research and development.

g)Marketing department includes the costs of market research, selling the products and other business costs.

h)Purchasing the cartridges from the external suppliers comes under the production department.

7 0
2 years ago
Anyone else getting 502 bad gateway on here?
Sever21 [200]
Nope I'm not having any trouble with this application try redownloading
7 0
3 years ago
State the use of an x-ray machine​
RideAnS [48]

Answer:

The use of an x-ray machine is used to take pictures of dense tissues such as teeth or bones. This is because bones absorb the radiation more than the less dense soft tissue. X-rays from a source pass through the body and onto a photographic cassette.

I hope this helps you!

Explanation:

3 0
2 years ago
Other questions:
  • Nadia would like to find text in her current document that differentiates CompanyABC from companyabc. Which option should she us
    8·2 answers
  • Write a Scheme function called "sum" which takes an input function func and a nonnegative number n and outputs the value
    10·1 answer
  • What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
    6·1 answer
  • The IT infrastructure components should be evaluated based on their expected financial value. All of the following are used to q
    15·1 answer
  • Write SQL statements for the following: 1. 2. 3. Change the column Z of a table XYZ to now acceptdefault value 9999 Delete a tab
    8·1 answer
  • Gina wants to consistently format the headings in all of her worksheets.. . Which is a quick way to do so?. A)Format the heading
    10·1 answer
  • Which TWO of these correctly describe a Trojan horse malware?
    11·2 answers
  • What starts with p and ends with orn
    15·2 answers
  • Which of the following statements best explains how multitasking works in the human mind?
    11·1 answer
  • What variation pairs a new employee with an employee who has been with the company for 20 years?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!