1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
3 years ago
5

In order to plan George's birthday, his father gave him a list of people who attended his birthday for the last five years. What

function (in a spreadsheet) should George use to estimate the likely number of guests to expect? A. Rank B. Average C. Median D. Mode E. Min
Computers and Technology
1 answer:
Anastaziya [24]3 years ago
3 0

Answer:

Average

Explanation:

The best option for this example is to use the function average because we can to know the average of people in those five years, this function will sum all the people and then will divide by the years, in this case 5 years, for example =average(23+12+33+26+19)/5 this is equal to 23, median and mode only return the number most repeated in a range, and min return the less value in a range.

You might be interested in
Which of the following are typically an example of primary resources?
TiliK225 [7]
I believe the answer is B. Biographies and histories. (Otherwise its D)
5 0
4 years ago
On what dates did the 2016 Olympics take place( list all)
kow [346]
Hi!

The 2016 Olympics took place from August 5th, 2016 - August 21st, 2016.
3 0
4 years ago
Read 2 more answers
What are the sectors of the buisness enviornment
Alinara [238K]

Answer:

The external business environment consists of economic, political and legal, demographic, social, competitive, global, and technological sectors.

4 0
2 years ago
Which best explains why magnets can push on or pull other magnets without touching them?
xeze [42]

A is wrong.

B is correct.

C is true but magnetic monopoles have been predicted in theory, but never found in practice.

7 0
3 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Other questions:
  • Which type of wireless network is<br> controlled through a wireless<br> access point?
    7·1 answer
  • A forensic investigation discovered that accounts belonging to employees who were terminated numerous years ago were recently us
    9·1 answer
  • An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo
    11·2 answers
  • Different video files and ______ can cause compatibility issues to arise between computer systems.
    8·1 answer
  • Write a program that performs the following tasks: Display a friendly greeting to the user Prompt the user for the value to conv
    13·1 answer
  • A file name extension provides what information about a file?
    6·1 answer
  • Political parties to address the interest of civil society<br>​
    7·1 answer
  • FIRST TO Answer for free brainlest. GOG GOGOGO
    6·1 answer
  • 48
    8·1 answer
  • as a pc technician, you are on the road most of the day and use a laptop. when you get back to your office at the end of the day
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!