1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
6

In cell F15, insert a function that will automatically display the word Discontinue if the value in cell D15 is less than 1500,

or the text No Change if the value in cell D15 is greater than or equal to 1500.
Computers and Technology
1 answer:
777dan777 [17]3 years ago
3 0

Answer:

=IF(D15<1500, "Discontinue", "No Change")

Explanation:

Assuming that this is excel, you can locate the cell F15 and input the IF function. The formula for IF function is

IF(<condition>, <action if true>, <action if false>)

So before the 1st comma, we place the condition which is D15 < 1500

In the middle, before the 2nd comma, we place the text to display if D15 is less than 1500, which is "Discontinue".

In the last place, we place the text to display if D15 is greater than or equals to 1500, which is "No Change"

So the overall formula is =IF(D15<1500, "Discontinue", "No Change")

You might be interested in
A field with the extend data type can contain an attached file, such as an image, document, chart, or spreadsheet.
enyata [817]
The attachment data type can contain an attached file such as image document chart or spreadsheet. hope I helped
8 0
3 years ago
Which type of service offers a preconfigured testing environment for application developers to create new software applications
gtnhenbr [62]

The type of service offers a preconfigured testing environment for application developers to create new software applications is Software as a Service (SaaS).

<h3>What is software as a service SaaS?</h3>

Software as a service (SaaS) is known to be a type of service that gives its users the ability to be able to link to and also use cloud-based apps in course of the Internet.

Conclusively, The type of service offers a preconfigured testing environment for application developers to create new software applications is Software as a Service (SaaS) as it gives its best service.

Learn more about application developers  from

brainly.com/question/11352260

#SPJ1

5 0
2 years ago
Write a program in C which will open a text file named Story.txt. You can create the file using any text editor like notepad etc
ddd [48]

Answer:

See explaination

Explanation:

#include <stdio.h>

#include <stdlib.h>

int main()

{

FILE * file_object;

char file_name[100];

char ch;

int characters=0, words=0;

printf("Enter source file name: ");

scanf("%s", file_name); //asking user to enter the file name

file_object = fopen(file_name, "r"); //open file in read mode

if (file_object == NULL)

{

printf("\nUnable to open file.file not exist\n"); //check if the file is present or not

}

while ((ch = fgetc(file_object)) != EOF) //read each character till the end of the file

{

if (ch == ' ' || ch == '\t' || ch == '\n' || ch == '\0') //if character is space or tab or new line or null character increment word count

words++;

else

characters++; //else increment character count this assures that there is no spaces count

}

printf("The file story.txt has the following Statistics:\n"); //finally print the final statistics

if (characters > 0)

{

printf("Words: %d\n", words+1); //for last word purpose just increment the count of words

printf("Characters (no spaces): %d\n", characters);

}

fclose(file_object); //close the file object

return 0;

}

6 0
4 years ago
HELP ME PLEASE
seraphim [82]

Answer:

Questions and answers

Explanation:

3 0
3 years ago
what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Zigmanuir [339]

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:

8 0
3 years ago
Other questions:
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 200. Follow each number w
    8·1 answer
  • When working in the middle of a presentation, how do you preview the slide show from the current slide?
    12·1 answer
  • Which type of account is typically the MOST liquid?
    15·1 answer
  • Difference between ancient and modern mode of information <br> transmission
    12·1 answer
  • What is the main component of the EV3 Lego Robot called?​
    6·1 answer
  • Match each term in the second column with its correct definition in the first column. Write the letter of the term on the blank
    12·1 answer
  • Lucas wants to expand his vocabulary to better understand the sentence below. The insidious burglar moved through the house unhe
    7·2 answers
  • The purpose of Appetizers on the menu​
    6·2 answers
  • What is the bandwidth for asymmetric digital subscriber line<br> (ADSL)?
    10·2 answers
  • . A binary search has a right subtree but no left subtree. What noes contains that least element in the tree
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!