1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
10

On the Sales worksheet, enter a date function in cell C8 to calculate the number of years the first representative has worked fo

r your company. Copy the function to the range C9:C20.
Computers and Technology
1 answer:
alina1380 [7]3 years ago
5 0

Answer:

See Explanation Below

Explanation:

The question is missing some details.

To answer this question, I'll make the following assumption

The assumption is that Cell B8 contains the date which a worker commence work in the organization.

Working base on the above assumption; in cell c8, type the following

= DATEIF(B8,TODAY(),"Y")

The above function follows the syntax below.

=DATEDIF (Start_Date , End_Date , Unit )

Where B8 = Start_Date = Date of work commencement

The function TODAY() returns today's date and it represent End_Date

The unit is represented by Y which means that the function is to return the number of years.

To copy the function to range C9:C20.

Select the cell C8

Rest your cursor in the lower-right corner so that it turns into a plus sign (+), like this:

Drag the fill handle down to C20

You might be interested in
Software (often on firmware) designed to make physical products and devices "smarter" by doing things like sharing usage informa
kolezko [41]

Answer:

embedded system

Explanation:

Based on the scenario being described within the question it can be said that the type of software that is being described is known as an embedded system. This is actually a combination of both hardware and software that focuses on a specific function which is later implemented into a much larger system to allow it to become "smarter", by performing more complex tasks, which would otherwise not be possible.

5 0
4 years ago
If it is impractical to place guest users in a secure network, isolated from the production network by firewall barriers, then:
IgorLugansk [536]

Answer:

specific areas of access should be determined and they should be as restrictive as possible.

Explanation:

According to my research on security features of networks , I can say that based on the information provided within the question then specific areas of access should be determined and they should be as restrictive as possible. This would provide the highest level of security while still allowing production to be smooth.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

7 0
3 years ago
The pci express version 4.0 can provide up to what amount of throughput with 16 lanes for data?
netineya [11]

The PCL express version 4.0 can provide up to 32 gigabytes with 16 lanes for data.

<h3>What is PCI Express?</h3>

PCI Express, often known as PCIe or PCI-e, is a high-speed serial computer expansion bus standard that was developed to replace the previous PCI, PCI-X, and AGP bus standards.

Thus, it is correct to state that the PCL express version 4.0 can provide up to 32 gigabytes with 16 lanes for data.

Learn more about PCI Express:
brainly.com/question/13898111
#SPJ1

4 0
2 years ago
match the type of secondary storage devices to their examples. CD, hard disk, flash memory. answer choices: magnetic storage dev
alisha [4.7K]
Hi pupil here's your answer ::


➡➡➡➡➡➡➡➡➡➡➡➡➡

Column A Column B

1》CD = Optical Storage Devices

2》Hard Disk = Magnetic Storage Device

3》Flash Memory = Solid State Storage


⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅


Hope this helps. . . . . . .
3 0
3 years ago
In order to identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the
ira [324]

Answer:

True

Explanation:

Frame Tagging is a method Cisco developed to identify packets travelling through links also called VLAN Tagging.

8 0
4 years ago
Other questions:
  • Marie uses a browser to visit a blog. What is the unique identifier of the blog?
    13·2 answers
  • A. True
    7·1 answer
  • You can change the transparency of a picture used as a slide’s background with the ____.
    10·1 answer
  • You must. place a child in a federally approved child restraint device. if the child is
    5·2 answers
  • Privacy Group of answer choices must be respected if we are to function as complete, self-governing agents is an absolute value
    5·1 answer
  • 9.4 Code Practice: Your task is to determine whether each item in the array above is divisible
    14·1 answer
  • In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be co
    13·1 answer
  • Write a program that takes a list of integers as input. The input begins with an integer indicating the number of integers that
    8·1 answer
  • What is one way to process your thoughts about the information you are reading?
    15·1 answer
  • What does a companys code of ethics cover
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!