1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrac [35]
3 years ago
11

15. In cell D6, enter a formula to calculate the percentage of High Priority Customers Sales out of All Customers 2016 sales. (T

ip: The calculation should divide the 2016 High Priority Customer sales by the total 2016 sales for all customers.) Format the cell using the Percentage number format with no decimal places.
Computers and Technology
1 answer:
BigorU [14]3 years ago
6 0
First, input at the end of column A (containing High Priority Customers Sales Out): =sum(A1:A20) This represents the sum of the values from cell A1 to cell A20. Then, to calculate the percentage of each cell in A, input the formula: =(A1/$A$21)*100 This formula will give you the percentage of A1, if you drag the box down to A20, you will have all the percentages of each sale from A1 to A20. Then, format the cell using the percentage number format with no decimal places. Select column D then right click, "format cells" and select number, adjust the number of decimal places. <span />
You might be interested in
The process where the programmer steps through each of the program's statements one by one is called
viva [34]

The process where the programmer steps through each of the program's statements one by one is called \sf\purple{hand \:tracing}.

\bold{ \green{ \star{ \orange{Mystique35}}}}⋆

5 0
3 years ago
A media file refers to what kind of file? A. Clip art
prohojiy [21]

Waveform Audio (.wav) is a common file format. Created by Microsoft and IBM, WAV was one of the first audio file types developed for the PC. WAV files are defined as lossless, meaning that files are large and complete; nothing has been lost.

your answer will be

<h2><em><u>C; image</u></em></h2>
5 0
3 years ago
Read 2 more answers
A stack is initially empty, then the following commands are performed: push 5, push 7, pop, push 10, push 5, pop, which of the f
MatroZZZ [7]

Answer:

d

Explanation:

6 0
3 years ago
The function known as "Comments" can be displayed during a presentation<br>O True<br>False​
Sonja [21]

Answer:

false

Explanation:

Select the comment icon. on the slide. The Comments pane will open and you can see comments for that slide.

Select Reply to respond to a comment.

Select the Next or Back buttons to go between comments and slides.

3 0
3 years ago
Read 2 more answers
In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used
Brrunno [24]

A useful advantage of Asymmetric encryption over symmetric encryption is that there is no secret channel necessary for the exchange of the public key, unlike in the symmetric encryption which requires a secret channel to send the secret key.  

Another advantage of Asymmetric encryption is that is has increased security. Asymmetric uses two different keys (Public and private) for both encryption and decryption of data while symmetric uses one.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Why is it more secure to require a user to press ctrl+alt+delete to log on rather than displaying the windows welcome screen?
    15·1 answer
  • What are some of the potential sources of risk in a systems analysis and design project? How does the project manager cope with
    6·1 answer
  • According to the ethical computer use policy, users should be __________ of the rules and, by agreeing to use the system on that
    11·1 answer
  • Which grapgic element loads faster when used with text or audio
    7·1 answer
  • What is required to contain warnings, after several studies that have shown that they are a suffocation risk?
    15·2 answers
  • Both employers and employees have responsibilities and ___________.
    10·2 answers
  • Discuss seven multimedia keys​
    8·1 answer
  • 5.7 AP-Style MC Practice edhessive
    14·1 answer
  • Life without internet points
    7·2 answers
  • You are the IT security administrator for a small corporate network. The HR director is concerned that an employee is doing some
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!