1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tomtit [17]
3 years ago
8

You've been asked to find the largest number in a range of numbers. Which of the following could you use to find the largest num

ber in range E11:E23
Computers and Technology
1 answer:
Sloan [31]3 years ago
6 0
=MAX(E11:E23) would find you the largest number in that range.
You might be interested in
We canconnect  two or more computer together using cables true or false​
jekas [21]

This is true for most modern computers

8 0
3 years ago
_____ is the unauthorized entry into a computer system via any means
Montano1993 [528]
Hi,

The word you are looking for is "Hacking".

"Hacking is unauthorized entry into a computer system via any means."

Hope this helps.
r3t40
4 0
3 years ago
Why would an online survey of 2,000 visitors to your college’s Web site be of little use in assessing the neighboring community’
musickatia [10]

Answer: the sample is not representative of the community.

Explanation:

Online surveys or surveys in general are made to obtain relevant information about a particular issue. If samples are not representative of that issue, they end up having little use.  

4 0
3 years ago
What are the three major functions of a game engine?
zzz [600]
Three major functions of a game engine would be Physics, Programming, and an audio engine should be some major functions of a game engine.
4 0
3 years ago
true or false: the larger your sample size for a survey, the more likely it is that you will draw false conclusions from your in
Alex_Xolod [135]
False. The more people you have the more likely you will have true conclusions...
6 0
3 years ago
Other questions:
  • Properly defined the primary part of a CPU​
    5·1 answer
  • Hosts A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 126. Sup
    10·1 answer
  • Unwanted email sent to large groups of people who did not request the communication is called _____
    12·1 answer
  • Can someone solve this for me please? It’s part of an escape room.
    13·2 answers
  • 41. All the following software are examples of operating systems EXCEPT
    5·1 answer
  • A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
    5·1 answer
  • 4.2 Lesson Practice​
    8·2 answers
  • Which field would best function as a primary key for a table that tracks orders?
    11·2 answers
  • Suggest three ways in which celebrating an occasion influences food choices?
    10·2 answers
  • To reduce the potential for repetitive stress injury you should use proper?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!