1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
13

Insert a function in cell g5 to calculate the first student's monthly payment, using appropriate relative and absolute cell refe

rences.
Computers and Technology
1 answer:
-Dominant- [34]3 years ago
3 0

I guess the correct answer is =PMT($B$22,12,-E5)

By dеfault, all cеll rеfеrеncеs arе rеlativе rеfеrеncеs. Whеn cοpiеd acrοss multiplе cеlls, thеy changе basеd οn thе rеlativе pοsitiοn οf rοws and cοlumns. Fοr еxamplе, if yοu cοpy thе fοrmula =A1+B1 frοm rοw 1 tο rοw 2, thе fοrmula will bеcοmе =A2+B2. Rеlativе rеfеrеncеs arе еspеcially cοnvеniеnt whеnеvеr yοu nееd tο rеpеat thе samе calculatiοn acrοss multiplе rοws οr cοlumns.

You might be interested in
What is the name of a computer or application program that intercepts user requests from the internal secure network and then pr
defon
A proxy server is a server that intercepts user requests from the internal secure network and then processes that request on behalf of the user.
The proxy server can be a computer or application program<span> that gets the requests from clients and seeks resources from other </span>servers. It is a <span>intermediary point between the end user and the backbone network.</span>
8 0
3 years ago
Allowing every communication is a bad idea from a security standpoint as well as a productivity one.TrueFalse
s344n2d4d5 [400]

Answer:

The answer to this question is True.

Explanation:

If we allow every communication this will not be a great idea if we want better security and better productivity.

There will be a lot of spam communications so the productivity and the security will also degrade because of that.

So if we want better productivity and security we have to allow a certain number of connections.

Hence the answer to this question is True.

4 0
3 years ago
The HTML tag for the smallest heading is​ what​
Gre4nikov [31]

Answer:

The HTML <h1> to <h6> tag is used to define headings in an HTML document. <h1> defines largest heading and <h6> defines smallest heading.

Explanation:

5 0
3 years ago
Universal Containers is designing a new community using the Customer Community license type. They would like to have the users c
motikmotik

Answer:

The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Explanation:

Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?

A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.

B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access

C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.

D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.

The explanation of the answer is now provided as follows:

Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.

The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.

By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

5 0
3 years ago
Suppose you have the following declaration.int[] beta = new int[50];Which of the following is a valid element of beta.(i) beta[0
kompoz [17]

Answer:

The answer is "Option (i)".

Explanation:

  • In the given question, an array is defined. It is a collection of the same type of data element, which means, array stores either a numeric value or string value at a time.  
  • An array beta is defined, which contains 50 elements. The array elements indexing always starts with 0 which means, the first element of the array will be stored in an index value that is 0. That's why option (i) is correct.
8 0
3 years ago
Other questions:
  • Blender questions
    8·1 answer
  • The internet is an example of
    12·2 answers
  • Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Gro
    13·1 answer
  • Merge arrays A and B into array C using merge sort algorithm. Give final sorted numbers of C using colored numbers without showi
    13·1 answer
  • A __________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers
    10·1 answer
  • Explain the concept of an engineering trade-offs and give an example
    6·2 answers
  • This program will output a right triangle based on user specified height triangleHeight and symbol triangleChar. (1) The given p
    14·1 answer
  • Charlie does not think he will be able to finish his project by the deadline at this point in the decision making progress to so
    13·1 answer
  • Which graphic file format would you choose if you needed to make an animated graphic for a website?
    5·1 answer
  • What are the advantages of using a vpn?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!