1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anarel [89]
2 years ago
11

I have been trying to work on this for a while now, and this is on excel

Computers and Technology
1 answer:
cluponka [151]2 years ago
8 0

Answer:

=IF(INDEX(INDIRECT(C10), B10)=0,"",INDEX(INDIRECT(C10), B10))

Or

=IF((INDEX((INDIRECT(Dept,TRUE)),Reason))="","",(INDEX((INDIRECT(Dept,TRUE)),Reason)))

Explanation:

Given

Your formula:.

=INDEX(INDIRECT("Dept"),Reason)

Dept column = C (C10)

Reason field = B (B10)

The issue with your formula is that you failed to include a statement to test the falsity of the first condition; in other words, if your if statement is not true, what else should the formula do.

The question says that

"Nest the function inside an IF function so that issues currently displaying as a 0 will display as a blank cell" this means that

if the INDEX() function returns 0, a blank should be displayed in H10 blank, instead.

So, the right formula both of these two. You can use any of them

1. =IF(INDEX(INDIRECT(C10), B10)=0,"",INDEX(INDIRECT(C10), B10))

2. =IF((INDEX((INDIRECT(Dept,TRUE)),Reason))="","",(INDEX((INDIRECT(Dept,TRUE)),Reason)))

The two does the same function; the only difference is that

(1) considers the cell itself while (2) considers the contents of the cell.

The analysis of both is that

They both use a nested indirect reference to check for the content of cells displaying 0.

The first if checks for the above mentioned; if yes, cell H10 is made to display a blank else it's original content is displayed.

You might be interested in
In a flashdisk wich icon can you use to open files in computer​
Dvinal [7]

Answer:

In a flashdisk,

If you are windows: click "my computer", and under the "cpmputer" section, you will find your flashdisk's name, and click it, in there you can find and also open your files.

If you are Mac: click "Finder", click "Desktop" and find your flashdisk's name, and click it, in there you can find and also open your files.

6 0
3 years ago
What features are offered by most of the email programs with for receiving and sending messages?
Varvara68 [4.7K]

Answer:

The main features of email is, (1) Attachment :Ability to attach the files along the messages is one of most useful features of email. (2)Address book: It is also most important features of email that allows a user to storing the information.

Explanation:

3 0
2 years ago
What is the exclusive legal right granted to all authors and artists that gives them sole ownership of their work to print, publ
Arisa [49]
The answer is copyright like for example if you copy and paste a essay offline and don’t give credit to the author it called copyright
7 0
2 years ago
Read 2 more answers
NEED HELP ASAP!!!
Triss [41]

Answer:

Feet & Inches

4). Millimeters

5). Pixels

3 0
2 years ago
Write common ICT tools​
Naddika [18.5K]
  • computers
  • laptops
  • printers
  • scanners
  • software programs
  • data projectors
  • and interactive teaching box.

4 0
2 years ago
Other questions:
  • How many megabytes of data can a factory made audio cd hold?
    13·1 answer
  • I have tried installing "windows media player" on my computer but at a point, something disrupts its instalment or I am asked to
    7·1 answer
  • Communications that take the form of electronic junk mail or unsolicited e-mail are referred to as
    13·2 answers
  • :If a process terminates, will its threads also terminate or will they continue to run? Explain your answer.
    14·1 answer
  • PLEASE HELP FAST !!!!!!!!!!
    12·1 answer
  • In a car crash, wearing a seat belt __________________.
    5·2 answers
  • Which of the following is NOT an example of soft skill?
    10·2 answers
  • Please help!!
    6·1 answer
  • Did you know a security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer sy
    11·2 answers
  • An IT company has a HealthCare application with data security requirements such that the encryption key must be stored in a cust
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!