1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga55 [171]
3 years ago
9

In cell q9 enter a formula using the countif function and structured references to count the number of staff members who have pa

rticipated in [leadership training]

Computers and Technology
1 answer:
bogdanovich [222]3 years ago
4 0
Uses of count function 1.0 COUNTA(range) - when COUNTA() is used, it counts the number of entries on the particular range defined. As long as the cell on the range specified is not emptye.g. Formula is COUNTA(A2:A13), The result would be 12. We have 12 non empty entries on the range
2.0 COUNTIF() - counts the entries on the specified range which satisfies the given conditione.g. Formula is COUNTIF(A2:A13,"Staff"), the result of this is '4'. Where it is specified to count cells with text "Staff" Note : "" (double quotes), denotes that the entry inside is text. 

Find attached Sample

You might be interested in
Course Name Grade to Date Progress Overdue Activities
crimeas [40]

lol

i understand hi

hi hi

3 0
3 years ago
We assume that ABC Corporation has two business offices. These offices are in the cities of Orlando and Miami. These cities are
murzikaleks [220]

Answer:

The following are the answer to the given points:

Explanation:

In point (a):

Calculating the long-distance call cost:

= 4 \times 5 \times 0.40 \\= 20 \times 0.40\\= 8

Calculating the local call cost:

= 10 \times 3  \times 0.05\\ = 30 \times 0.05\\= 1.5

Calculating the overall cost of PSTN:

= 25 + (4 \times 5 \times 0.40) + (10 \times 3 \times 0.05) + 2000 + 275 \\= 25 + 8 + 1.5 + 2000 + 275 \\=   2309.5

In point (b):

Calculating the call rate per second and the average arrival rate:

\to (\lambda) = 0.2

The call average length:

\to (T_s) = - 8  \\\\ = (8  \times 60) \ seconds \\\\ = 480 \ seconds  

The complete agent number:

\to  (m) = 9

The strength of traffic:

\to u = \lambda \times  T_s  \\\\  =   (0.2  \times 480) \\\\ = 96    

The occupancy of the agent:

\to  p = \frac{u}{m}  \\\\

      = \frac{96}{9}  \\ \\= 10.66  

Calculation of obtained:

= \frac{(\frac{um}{m!})}{(\frac{um}{m!})} + (1-p) \sum {m-1} _{k=0}  \ \frac{uk}{k!}

We get = 0.329 to substitute values.  

In point (c):

The rate of blocking = 5 \%

average call time (T_s) = 480 \ seconds

                                    = 0.05 \times  480 \ seconds \\  = 24 \ second

In point (d):

Calculating the number of link, which is required:  

= \frac{275}{5} \\\\ =55

In point (e):

Calculating the Line Number:

= \frac{275}{5} \\\\ =55

PSTN line number:

=  (\frac{2000}{55}) \\\\ = 36.3636\\\\= 37

In point (f):

The gross design expense = $ 2309. 5

5 0
4 years ago
Inputs to a system that can enhance performance is called
disa [49]
Inputs to a system that can enhance performance is called Resources
6 0
3 years ago
Read 2 more answers
What is the difference between a rendering engine and a browser engine?
Vlada [557]

Answer:

D) A rendering engine displays content on the screen and a browser engine coordinates user interface interactions.

Explanation:

The rendering engine will deal with all the HTML code and will generate an output based on its own rules for interpreting the code.  That's why different rendering engines will have different renditions of the same given HTML code. You can notice that in the acceptance of HTML5 and CSS3 tags, which are not universal yet.

The browser engine will deal with the user interface and all other features that make a browser a browser, relying on the rendering engine for the display.

That duality allows different browsers to use the same rendering engine, thus have similar outputs.

7 0
3 years ago
Read 2 more answers
In computer science, what does the word security mean?
zepelin [54]

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

4 0
3 years ago
Other questions:
  • SubVIs...
    15·1 answer
  • A type of address translation in which a gateway has a pool of public ip addresses that it is free to assign to a local host whe
    8·1 answer
  • If everyone's choice for their computer printer were an hp laserjet 4100, there would be a ___ preference segment in the compute
    8·1 answer
  • The addElement operation for the linked implementation must determine the parent of the next node to be inserted. Why?
    5·1 answer
  • If you write a toString method to display the contents of an object, object1, for a class, Class1, then the following two statem
    7·1 answer
  • Jerry can use an <br> program to restrict information from going out without his permission.
    12·2 answers
  • Discuss the term business information SYSTEMS ​
    15·1 answer
  • PLEASE HELP!!!
    7·1 answer
  • Define print_shape() to print the below shape. Example output:
    8·1 answer
  • The top-level domain (tld), also known as the ________, typically identifies the type of organization an address is associated w
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!