1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
4 years ago
12

Give the logical function for the following: If cell B7 equals 12, check contents of cell B10. If cell B10 is 10, then the value

of the function in the string is YES; if not, it is a blank space. If cell B7 does not equal 12, then the value of the function is 7
Computers and Technology
1 answer:
ASHA 777 [7]4 years ago
5 0

Answer:

=IF( B7 = 12, ( IF( B10 = 10,"YES", "")), 7) and PRESS ENTER

Explanation:

the above logical if function checks the following

-IF cell B7 is 12, if true, check the value of cell B10, IF cell B10 contains 10 the function should produce YES as output to whatever cell selected, IF B10 is not 10 output of the function should be an empty string, IF B7 is not equal to 12 the the output of the function should be 7.

You might be interested in
#Step 1 Get first value from user #Remove the hastag (#) from the front of ONE of the #three lines below, which will allow the p
olga2289 [7]

Answer:

Explanation:

what is the question

6 0
3 years ago
Give a recursive algorithm to compute the sum of the cubes of the first n positive integers. The input to the algorithm is a pos
DaniilM [7]

Answer:

def sum_cubes(n):

   if n == 1:

       return 1

   else:

       return n * n * n + sum_cubes(n-1)

print(sum_cubes(3))

Explanation:

Create a function called sum_cubes that takes one parameter, n

If n is equal to 1, return 1. Otherwise, calculate the cube of n, and add it to the sum_cubes function with parameter n-1

If we want to calculate the cubes of the first 3 numbers:

sum_cubes(3) = 3*3*3 + sum_cubes(2)

sum_cubes(2) = 2*2*2 + sum_cubes(1)

sum_cubes(1) = 1

If you substitute the values from the bottom, you get 27+8+1 = 36

7 0
3 years ago
What's the drawback of using Screened Subnet (DMZ)?
lesantik [10]

It's more expensive, it's more difficult to configure and maintain and it can be more difficult to troubleshoot

4 0
4 years ago
Ryan is the operations manager for a national financial company. His company is in the process of creating a customer handbook.
Nat2105 [25]

Answer:

Ryan first needs to determine his goals, in his case he is looking for a telecommunications technology that will often need to be updated and revised by others. Once he determines what he is looking for he can start gathering data, and once he's done that he can analyze his choices from the data he's gathered, in his case I would assume he'd be looking at either a wiki or a blog. Now it's time for Ryan to make his decision, I would go with a wiki since a wiki can be updated by many people in diverse locations. He said so himself that employees all over the country would be contributing to it so that is why I think a wiki would best suit him. Now that he's made his decision and can take a step back and evaluate what he has done and make sure he made the right choice.

Explanation:

:)

3 0
3 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
4 years ago
Other questions:
  • In the web address www.microsoft, the "" is the _____ meaning _____. A. B. C. D. Group of answer choices top-level domain (TLD);
    6·1 answer
  • Assume each student is assigned an advisor from a department. Each classroom is assigned a classroom (class# determines Classroo
    14·1 answer
  • All nuclear energy results in the rapid release of energy, such as in atomic bombs. true or false
    8·1 answer
  • WILL UPVOTE <3
    9·1 answer
  • Your friend gave you a flash drive containing photos from a weekend event. After you copy the files, you notice a bunch of .DS f
    6·1 answer
  • ____ is the amount of effort (usually in hours) required to perform cryptanalysis on an encoded message so that it may be decryp
    8·1 answer
  • How to delete Brainly account ?​
    12·1 answer
  • My brainly isnt working it isnt showing and answers wats going on? wat do i do
    14·2 answers
  • Which key doesn't relate to keyboard A:return key B :enrollment key C: delete key D:tab key
    9·2 answers
  • A program that organizes sequences of automated provisioning tasks. A. Application Packager B. Sequence Manager C. Sequence Logg
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!