1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
3 years ago
10

Entering the formula =SUM(C5:C18) in cell C19 will result in which of the following?

Computers and Technology
1 answer:
frozen [14]3 years ago
3 0
Well the result shown in C19 will show the sum of all cells from C5 to C18:
ie: C5 + C6+ C7+ C8+ C9+ C10+ C11+ C12+ C13+ C14+ C15+ C16+ C17+ C18

:)
You might be interested in
Every telecommunication setup uses two devices: one device to transmit data and one device to receive data. Which device transmi
alexandr1967 [171]

Answer:

Cell.

Explanation:

Electromagnetic waves is a propagating medium used in all communications device to transmit data (messages) from the device of the sender to the device of the receiver.

Generally, the most commonly used electromagnetic wave technology in telecommunications is radio waves.

Radio waves can be defined as an electromagnetic wave that has its frequency ranging from 30 GHz to 300 GHz and its wavelength between 1mm and 3000m. Therefore, radio waves are a series of repetitive valleys and peaks that are typically characterized of having the longest wavelength in the electromagnetic spectrum.

Basically, as a result of radio waves having long wavelengths, they are mainly used in long-distance communications such as the carriage and transmission of data.

In the field of telecommunication, all telecommunication setup are designed and developed to make use of two network devices: one device is typically used for the transmission of data while the other device is used to receive data that are sent on the network.

Generally, cell towers are tall poles that are used to transmit frequencies to mobile phones.

3 0
3 years ago
?an ip address reservation is made by creating an association between an ip address and what type of client identifier?
victus00 [196]
The ethernet address, a.k.a. mac address. That way, a DHCP server can give the same IP address to a returning client.
3 0
4 years ago
The user documents are stored in _______ format.
BartSMP [9]

The user documents are stored in _______ format.

A. qvd.

B.  qvw

C.  None of the options

D.  qvs.

Answer:

B.  qvw

Explanation:

Given the options available, it can be inferred that the application the question is referring to is called QlikView which is a software application that is used for analytics explanation. This software applications saves documents created in a file extension specifically known as "QVW."

Hence, the right answer is that: in QlikView, the user documents are stored in QVW format.

8 0
3 years ago
What is the output of doublec= 12.0 / 5 Systemoutprintln (c)
artcher [175]

Answer:

The code will produce:-

2.4

Explanation:

In this code the result of the arithmetic operation is stored in the variable c.On evaluating the expression it divides 12.0 by 5 which results in 2.4 and it is stored in float variable c.Then it is printed on the screen using print statement.Since the c is double variable so the result will be a decimal number.

Hence the answer is 4.

6 0
3 years ago
2.4 Code Practice: Question 1
USPshnik [31]

Answer:

num = float(input("Enter a number : "))

ab = abs(num)

sqrt = float(ab ** 0.5)

print(sqrt)

Explanation:

6 0
4 years ago
Other questions:
  • Many shops are simply plugging up their drains to keep from inadvertently violating the law and creating environmental contamina
    15·1 answer
  • Helppppppppppppppppppp
    11·1 answer
  • A program that contains the following method: public static void display(int arg1, double arg2, char arg3) { System.out.println(
    15·1 answer
  • The _______ "represents a set of features that enables the user to inform himself whether a security feature is in operation or
    8·1 answer
  • Write a program to test the various operations of the class clockType
    8·1 answer
  • Which of the following attack is a threat to confidentiality?
    10·1 answer
  • Technician A says that it's a good idea to perform a test drive before attempting repairs. Technician B says that it's a good id
    9·2 answers
  • In order for bitlocker to protect the system volume without the aid of an external drive, your computer must:
    12·2 answers
  • In Secure Electronic Transaction, the purpose of Dual Signature is to link two messages that are intended for two different reci
    5·1 answer
  • The data source in the document which has the information common to all documents. True or false 
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!