1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
diamong [38]
3 years ago
6

Column A contains numbers from rows 1 to 20. You can use the formula (blank) to find the value of the largest number divided by

the total number of value.
Computers and Technology
2 answers:
storchak [24]3 years ago
6 0
This question can easily be answered if you have an idea about handling spreadsheet applications.

Let's say MS Excel
<span>Column A contains numbers from rows 1 to 20. You can use the formula _______ to find the value of the largest number divided by the total number of value.

In MS Excel, the formula MAX ( ___ ) and COUNT ( ____ ) to get the value
= MAX(A1:A20) / COUNT(A1:A20)</span>
kirill115 [55]3 years ago
5 0

Answer:

<em> =LARGE(A1:A20, 1)/COUNT (A1:A20)</em>

Explanation:

Count [<u><em>Ai:An]</em></u> Function that allows to count the total number of values in a cells range between Ai and An that contain only numbers. Large [<em><u>Ai:An, k]</u></em><em> </em>Function that allows to find the value of the largest number in a cells range between Ai and An, the number k determine the k-th largest value

You might be interested in
What is the energy conversion of solar water heaters?
Gelneren [198K]
A liquid-to-liquid heat exchanger uses a heat-transfer fluid that circulates through the solar collector, absorbs heat, and then flows through a heat exchanger to transfer its heat to water in a storage tank. Heat-transfer fluids, such as antifreeze, protect the solar collector from freezing in cold weather.
7 0
4 years ago
As a bank employee, you often work from home and remotely access a file server on the bank’s network to correct errors in financ
strojnjashka [21]

Answer:

TACACS+

Explanation:

Terminal Access Controller Access-Control System Plus (TACACS+) is a protocol that provides detailed accounting information and flexible administrative control over the authentication, authorization, and accounting process.

3 0
3 years ago
Henry is sent to work with a customer at the company’s satellite branch in another town. During his visit, he notices that most
Dmitriy789 [7]

Answer:

Correct option is B: Train the employees on why these issues are security concerns

Explanation:

When employees do not follow corporate guidelines regarding information systems and security, it is the duty of organizations to ensure that every employee knows the importance of following these guidelines due to the security risk the company might face. Hence, it is Henry's duty to ensure that he trains the employees on why their not following guidelines and looking at their personal emails are security concerns. This way he is sure that the employees are aware of the risks and any further breach in policy from them would require consequences.

7 0
3 years ago
_____ is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it
babymother [125]

Answer:

Case-based reasoning.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Case-based reasoning is a problem-solving technique where each problem in a database is stored with a description and keywords that identify it. It is typically based on cognitive science and artificial intelligence.

7 0
3 years ago
What happens if you try to compile and run this program?
Lynna [10]

Your question is poorly formatted

<em>#include <stdio.h> </em>

<em>int main(void) { </em>

<em>int i, t[4]; </em>

<em>t[3] = 0; </em>

<em>for (i = 1; i >= 0; i--) </em>

<em>t[i] = t[3] * i; </em>

<em>printf("%d", +t[1]); </em>

<em>return 0; </em>

<em>}</em>

Answer:

It outputs 0

Explanation:

I'll start my explanation from the third line

This line declares an integer variable i and an array of 4 elements of type integer

<em>int i, t[4]; </em>

<em />

This line initialize the 3rd index element to 0

<em>t[3] = 0; </em>

<em />

The next two lines is an iteration;

The first line of the iteration iterates the value of i in descending order from 1 to 0

<em>for (i = 1; i >= 0; i--) </em>

<em />

This line of the iteration calculates t[1] as t[3] * i and t[0] as t[3] * i; Since t[3] is 0; both t[1] and t[0] will be 0

<em>t[i] = t[3] * i; </em>

<em />

This line prints t[1] which is 0

<em>printf("%d", +t[1]); </em>

7 0
3 years ago
Other questions:
  • What security protocol originally came with 802.11 equipment?
    11·1 answer
  • What is Processor to Memory Mismatch problem?
    15·1 answer
  • Media messages are communicated through which of the following:
    8·2 answers
  • You are purchasing several PC systems that will be used as thin clients in a large organization. Which hardware selection criter
    9·1 answer
  • In this scenario, hackers launch cyber-attacks that affect several parts of the nationâs financial infrastructure over the cours
    8·1 answer
  • In the design phase of the systems development life cycle (SDLC), the _____ design is an overview of the system and does not inc
    10·1 answer
  • What spreadsheet tool could be used to add together the numbers in a<br> selected group of cells?
    10·1 answer
  • Consider the following code:
    6·1 answer
  • How was science used to make television?
    6·2 answers
  • I will give brainliest to the best answer. what is a good screen recorder
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!