1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
3 years ago
13

The manager of a sports club has data about the club members' ages in a workbook. He wants to find which age is most common. Whi

ch workbook function will help him find htis information?
Computers and Technology
2 answers:
Nadusha1986 [10]3 years ago
7 0
Excel workbook provides a function which can help the manager to find the most common ages in the list. Mode function of excel will do the job for him.
Ksju [112]3 years ago
4 0

the answer is A !!!!

You might be interested in
PLEASE HELP ME ASAP!!! THIS IS DUE SOON!!
KengaRu [80]

The below displays ice-creams with its associated flavours. This we would display using <UL>

• Stick

o Chocobar

o Feast

• Bowl

o Butterscotch

o Blueberry

<UL>

 <LI>Stick

  <UL>

  <LI>Chocobar </LI>

  <LI> feast</LI>

  </UL>

 </LI>

<LI>Bowl

  <UL>

  <LI> Butterscotch </LI>

  <LI> Blueberry </LI>

  </UL>

 </LI>

</UL>

Here <UL> tag is used to create un ordered list and one another <UL> tag inside <LI> created nested list which is the actual requirement. Like this we can created nested unordered lists and you can nest upto 4 levels and increasing the number of levels further may reduce clarity.

3 0
3 years ago
When creating a user generated function, what procedure is followed?
marin [14]

When creating a user-generated function, what procedure is followed d) all of the above.

<h3>What are the three factors of user-described characteristic?</h3>

A user-described characteristic has 3 essential additives which might be characteristic declarations, characteristic definition and characteristic called.

The characteristic prototypes are used to inform the compiler approximately the variety of arguments and approximately the specified datatypes of a characteristic parameter, it additionally tells approximately the go-back kind of the characteristic. By this information, the compiler cross-assessments the characteristic signatures earlier than calling.

Read more about the prototype :

brainly.com/question/7509258

#SPJ1

6 0
2 years ago
How does the medium affect the amplitude of sound?
Ratling [72]

The amplitude of a sound energy depends upon the how much energy we are giving to the wave or how much compression on the wave is taking place.

It does’t depends upon the wave length,frequency


7 0
3 years ago
PLEASE HELP
Schach [20]

Answer:

Here

Explanation:

If you use a single user account on your computer, everyone will share the same application settings, files, and system permissions. Application Settings: When you use a single user account, everyone using the computer will use the same browser. Most programs will use different settings for each user account.User accounts also serve as a means for granting permissions, applying logon scripts, assigning profiles and home directories, and linking other working-environment properties to a user.

hope it helps ;P

7 0
3 years ago
When a peanut farmer adds value to his peanuts by turning them into creamy peanut butter, the farmer is engaging in which of the
Neporo4naja [7]

Answer:

The correct options are;

The security administrator makes sure to shred and properly dispose of any printed confidential information

The security administrator uses password-protected files and folders on his work computer

Explanation:

A company's policies as written in the employee manual, with regards to confidentiality, generally includes provisions and procedures on how to handle confidential information, including the requirement for the shredding of of printed confidential information that are to be disposed, such as information about the way the company operates, the earnings of the company and employee records

Password protection keeps confidential files and folders from being able to be accessed by people without the prerequisite authority, which ensures the confidentiality of the company's information is maintained.

3 0
3 years ago
Other questions:
  • After reviewing the various types of network connections available, a client chooses a network connection that is considered to
    13·1 answer
  • Which forensics tool would you use to reveal recent pages viewed via the internet explorer browser?
    10·1 answer
  • Which payment method typically charges the highest interest rates
    15·1 answer
  • Which option best describes the game Farmville? It is designed to educate players about virtual currencies. It is designed to ed
    6·2 answers
  • What is a symptom of a failing power supply? The display has only a blinking cursor. The computer displays a POST error code. Th
    12·1 answer
  • 3. Which one of the following statements is correct? _____ variables are those whose storage bindings are created when their dec
    12·1 answer
  • You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is lis
    13·1 answer
  • Pls help me!!!!!!!!!!!!!!!!!!!
    11·2 answers
  • ...................is a high level, structured , open source programming language​
    10·1 answer
  • 20 POINTS!!! I NEED HELPP
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!