1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julsineya [31]
3 years ago
13

When using a function to preform a calculation how would you select the range of numbers to use

Computers and Technology
1 answer:
Ivan3 years ago
7 0

Answer:

<u>Returns the average  (arithmetic mean) of the arguments.</u>

Explanation:

For example, if the range A1:A20 contains numbers, the formula =AVERAGE(A1:A20) returns the average of those numbers.

<u><em>(I hope this helps!)</em></u>

You might be interested in
Dots (or periods) in a Java statement are used to separate the names of the components that make up the statement.
julia-pushkina [17]

Answer:

B) False

Explanation:

The java programming language uses Dots (periods) as an operator (The dot operator). It is used when referring to the variables or methods of a class. The syntax is ClassName.variableName or ClassName.methodName. We are very familiar with the System.out (java.lang.System.out) which refers to the variable out contained in the class System. Another example is input.nextInt( ) In this case the nextInt ( ) method is being called.

8 0
4 years ago
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
3 years ago
What tab contains the copy and paste buttons
Nina [5.8K]
Any u just get the pointer and hilight it then u paste
7 0
3 years ago
Read 2 more answers
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
3 years ago
DeShawn uses Google Ads. He wants to enable website call conversion tracking so he can see how his current ad campaign is drivin
eimsori [14]

Answer:

A dynamically created Google forwarding number

Explanation:

A temporary number that is used to forward the call that are  assigned to a Google Ads call extension is called Google forwarding number. This number is used to forwards calls to the advertiser's phone number for the purpose of tracking call conversions.

These number are created dynamically to trace the advertisers conversation.

5 0
3 years ago
Other questions:
  • Java allows you to declare methods with the same name in a class. this is called
    10·1 answer
  • Need 9&amp;10. Thank you! Btw it's due today.
    11·1 answer
  • Microsoft Word is ________________ software.
    8·1 answer
  • Why was Unicode invented?
    11·1 answer
  • Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. Certain project
    11·1 answer
  • Help pleasee I would really appreciate <br>​
    5·2 answers
  • What are the tyoe of typical application of mainframe computer<br>​
    6·1 answer
  • Choose the correct term to complete the sentence.
    12·1 answer
  • After inserting a video into your slide how can you test it
    11·1 answer
  • Input images into a computer
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!