1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
diamong [38]
2 years ago
6

Column A contains numbers from rows 1 to 20. You can use the formula (blank) to find the value of the largest number divided by

the total number of value.
Computers and Technology
2 answers:
storchak [24]2 years ago
6 0
This question can easily be answered if you have an idea about handling spreadsheet applications.

Let's say MS Excel
<span>Column A contains numbers from rows 1 to 20. You can use the formula _______ to find the value of the largest number divided by the total number of value.

In MS Excel, the formula MAX ( ___ ) and COUNT ( ____ ) to get the value
= MAX(A1:A20) / COUNT(A1:A20)</span>
kirill115 [55]2 years ago
5 0

Answer:

<em> =LARGE(A1:A20, 1)/COUNT (A1:A20)</em>

Explanation:

Count [<u><em>Ai:An]</em></u> Function that allows to count the total number of values in a cells range between Ai and An that contain only numbers. Large [<em><u>Ai:An, k]</u></em><em> </em>Function that allows to find the value of the largest number in a cells range between Ai and An, the number k determine the k-th largest value

You might be interested in
With a ____ indent, all lines except the first line of the paragraph are indented from the left margin.
hoa [83]

The answer to this question is a hanging indent. A hanging indent is a writing format where in the first line of the text or paragraph is being aligned in the left margin. A hanging indent is also known as the hanging paragraph.  

3 0
3 years ago
Why do we allow electronic instruments to warm up before use?
son4ous [18]
Is not really a warm up!

we wait for the computer (electronic instrument) to load or process all the data in order to operate properly as its supposed to!
3 0
3 years ago
An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b)
aleksandr82 [10.1K]

Answer:

A

Explanation:

3 0
3 years ago
How is a contact list different from an address book
WITCHER [35]
An address book has a list of addresses
7 0
3 years ago
Read 2 more answers
On a web page coded in HTML, there is a sentence that reads, "Welcome to Assessments Section." Sam wants to insert the word "the
Natalka [10]

Answer:

The inserted text will appear as underlined text. The deleted text will appear as strike through text.

Explanation:

In HTML the text which has been inserted will appear as underlined text. It means if we insert something in HTML then it will underline it. This will highlight the text that has been inserted. While on the other hand if we delete some text and replace it with some other text, then it will appear as strikethrough text.

Strikethrough text is the text which is represented with a horizontal line in its center. It represents those words which are added by mistake and are not meant for inclusion.

7 0
3 years ago
Other questions:
  • You were discussing software piracy with a friend and were surprised to learn how software piracy can impact your life every day
    7·1 answer
  • All of the following are vertical alignment options except __middle , top, center, or_bottom_.
    12·1 answer
  • True / False<br> The exponent in floating point is stored as a biased value.
    9·1 answer
  • A bank uses a computer program during the night to tell if the alarm should ring. Sensors in the bank set the following Boolean
    5·1 answer
  • refers to a problem-solving approach that requires defining the scope of a system, dividing it into its components, and then ide
    12·1 answer
  • What is a ribbon in word
    15·2 answers
  • Please help meeee , you will get 20 points
    9·2 answers
  • Can you answer this question?
    9·1 answer
  • Can you move it like this? I can shake it like that
    6·1 answer
  • Attackers will sometimes put malware on USB drives and leave them in parking lots
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!