1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klio [65]
3 years ago
9

Create a division formula.

Computers and Technology
1 answer:
baherus [9]3 years ago
4 0

Answer:

=(A4+B4+C4+D4+E4)/5

Explanation:

If we want to have the average of the passengers, first we must sum all the revenue and then divide it with passenger quantity.

In this particular example, I made the formula with 5 passengers, I sum the 5 revenues and then I divide with 5 passengers if there are more passengers we must sum all of them, and divided all of them, for example:

=(A4+B4+C4+D4+E4+F4)/6

You might be interested in
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
2 years ago
Hello everyone. New ppl on Ro.blox? I want to play sometime.
alexira [117]

Answer:

Hello :)

Explanation:

Yesh i play Ro.blox, maybe u or me could friend each other

6 0
2 years ago
Read 2 more answers
(TCO B) The symbol shown as a three-sided box that is connected to the step it references by a dashed line is what?
Mekhanik [1.2K]

Answer:

Annotation symbol

Explanation:

A flowchart is a diagram that is used to show and represent a workflow, process or algorithm. Flow charts are used in designing processes or programs. Flow charts are usually designed using boxes and arrows.

An annotation symbol is a symbol used in flowchart to hold comments and it is usually represented by a three-sided box connected to the step it references by a dashed line.

7 0
2 years ago
Which statement compares the copy and cut commands?
ella [17]

Answer: duplicate

Explanation:

5 0
2 years ago
Read 2 more answers
The last step on Kotter’s Eight-Step Change Model is to anchor the changes in corporate culture; to make anything stick, it must
m_a_m_a [10]

Answer:

Therefore, it is important to find opportunities to integrate security controls into day-to-day routines.

Do you believe this to be true- Yes.

In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture. Is this correct or incorrect? - Incorrect

Explanation:

Truly, it is important to find opportunities to integrate security controls into day-to-day routines, this is in order to minimize future security threats by formulating company-wide security policies and educating employees on daily risk prevention in their work routines. In the operational risk controls, vigilant monitoring of employees must be implemented in order to confirm that policies are followed and to deter insider threats from developing.

Flexing and developing policies as resources and priorities change is the key to operational risk controls.

These risk controls implementation in organizational security is not a one-time practice. Rather, it is a regular discipline that the best organizations continue to set and refine.

For better preparation of an organization towards mitigating security threats and adaptation to evolving organizational security needs, there must be a proactive integration of physical information and personnel security while keeping these risk controls in mind.

12. In general, implementing security policies occurs in isolation from the business perspectives and organizational values that define the organization’s culture - Incorrect.

When security policies are designed, the business perspectives and the organizational values that define the organization’s culture must be kept in mind.

An information security and risk management (ISRM) strategy provides an organization with a road map for information and information infrastructure protection with goals and objectives that ensure capabilities provided are adjusted to business goals and the organization’s risk profile. Traditionally, ISRM has been considered as an IT function and included in an organization’s IT strategic planning. As ISRM has emerged into a more critical element of business support activities, it now needs its own independent strategy to ensure its ability to appropriately support business goals and to mature and evolve effectively.

Hence, it is observed that both the Business Perspective and Organisational goals are taken into consideration while designing Security policies.

6 0
3 years ago
Other questions:
  • When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment met
    6·1 answer
  • When creating an input control (for example, a button) on a form the _____________ indicates the data that is contained in the n
    13·1 answer
  • video-sharing sotes such as youtube and vimeo provide a place to post short videos called clips true or false?
    5·1 answer
  • What are the first and the last physical memory addressesaccessible using
    10·1 answer
  • When people talk about "the media," they often mean:?
    6·1 answer
  • Similarly, the Windows server OS can run regular workstation applications such as MS Office or Adobe Photoshop. Why is this a ba
    5·1 answer
  • Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its
    8·2 answers
  • Write a C++ program that would take 10 integers and outputs mean, median, and range. Create at least three functions: one for so
    7·1 answer
  • Video is a medium that's looks real anyways, but is real________________.
    10·1 answer
  • What do you mean by flow of program​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!