1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
4 years ago
8

When working in excel online, which of the following is considered a conditional formula?

Computers and Technology
2 answers:
Alika [10]4 years ago
8 0
B. Because conditional statements have an IF before stating the condition
lubasha [3.4K]4 years ago
3 0

Answer:

If(A1>1,true,false)

Explanation:

A conditional formula always contains keyword "if". The output value is dependent on whether the condition defined in the if statement is met or not.

In the given statement If(A1>1,true,false), the Excel will check if A1 bigger than 1, it will result in true value otherwise false value.  This is consider a simple example of conditional formula that only handles two conditions. In some complex cases that need to handle more than two conditions, we have to extend the formula with additional if statement.

You might be interested in
What do people in japan use to make anime
lions [1.4K]

software programming like adobe flash.

8 0
3 years ago
Which of the following is NOT a popular computer programming
cestrela7 [59]
Answer is Xero. All the other Languages are Popular and Widely Used.
Thank You!
6 0
3 years ago
Bends are made in pvc conduit using a tool known as a
USPshnik [31]
The answer is C) heater box
8 0
3 years ago
Read 2 more answers
A rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a P
Zanzabum

Answer:

TRUE

Explanation:

A rootkit is a collection of computer software, typically malicious, that is designed to grant an unauthorized user access to a computer or certain programs. Once a rootkit is installed, it is easy to mask its presence, so an attacker can maintain privileged access while remaining undetected.

Rootkit detection is difficult because a rootkit maybe able to subvert the software that is intended to find it.

Rootkits work by using a process called modification (the changing of user account permissions and security).

Rootkits are not malware themselves, but rather a process used to deploy malware on a target.

Therefore, it is TRUE that a rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a PC without the knowledge or consent of a user.

3 0
3 years ago
Write an application that reads the lengths of the sides of a triangle from the user. compute the area of the triangle using her
zlopas [31]

Here you go,


import java.util.Scanner;

import java.util.Random;

public class OrderCalculator{


public static void main(String[] args){  


float x, y, z, semi, area;

Scanner in = new Scanner(System.in);

System.out.print("Enter the 3 sides: ");

x = in.nextFloat();

y = in.nextFloat();

z = in.nextFloat();

semi = (float) ((x + y + z) / 2.0);

area = (float) Math.sqrt(semi * (semi - x) * (semi - y) * (semi - z));

System.out.printf("The area is: %.3f\n", area);


}

}

3 0
3 years ago
Other questions:
  • On a DTP project, Morgan is preparing digital files to be sent to a printer. Which word describes the activity that Morgan is pe
    5·2 answers
  • Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network thr
    13·1 answer
  • Which statement is true? Group of answer choices Variables cannot be assigned and declared in the same statement Variable names
    5·1 answer
  • ____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other
    9·1 answer
  • Suppose you're currently completing an examination online. When you're finished, you click on Reset Exam. Why would you do this?
    8·1 answer
  • Distinguish between exponentiation and modulus. Be specific.
    5·1 answer
  • Q: If a program is invoked with "python program.py -r input.dat output.dat", what are the elements of argv?
    10·1 answer
  • Procedural programs specify instructions that a processor must execute to perform computations. These programs sometimes consist
    11·1 answer
  • Besides a backup technician, who else would have encrypted backup passwords?
    7·1 answer
  • 1 pts Question 5 Which of the following calculations would evaluate to 12? (36) + 2/2, 3* ((6+2)/2), 3* 6+2/2, (306+ 2)/2​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!