1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady_Fox [76]
3 years ago
15

What function should be entered into B7 to calculate the total budget

Computers and Technology
2 answers:
PSYCHO15rus [73]3 years ago
4 0

Answer:

=SUM(B3:B6)

Explanation:

KiRa [710]3 years ago
3 0

Answer:

Explanation:

In excel we have two options to calculate a total budget, for example, we're going to assume that we have 3 values A6, B6, C6, In this case, we can use this formula =A6+B6+C6 or =SUM(A6:C6), in both ways we're going to have the same result because this is a sum but with different formulas, even we can select specific rows, is not necessary to add range.

You might be interested in
After creating a webpage with html code, what do you need to do so that others can access it on the internet?.
allochka39001 [22]

Answer:

People can figure out a way to reach one another without the use of traveling!

Explanation:

5 0
2 years ago
Consider the following C++ program in which the statements are in the incorrect order. Rearrange the statements so that itprompt
choli [55]

Answer:

The correct program to this question can be given as:

Program:

//header file

#include<iostream> //include header file

using namespace std;

//main

int main() //defining method main

{

double radius,area=0; //defining variables

double PI=3.14; //defining variable PI and assign value

cout <<"Enter the radius: "; //message

cin >> radius; //input value by user

area = PI * radius * radius; //formula to calculate area

cout << "Area: "<< area << endl; //print area

return 0;

}

Output:

Enter the radius: 3.0

Area: 28.26

Explanation:

In the above program code, a header file is included. In the next line, the main method is defined, which contain three double type variable that is "radius, area, and PI".

  • The radius variable is used to take input by the user, and the area variable is to calculate the area of the circle, and the PI is used to hold a constant value, which is "3.14".
  • After taking user input in radius variable the area variable has used the formula of the circle, which calculates a value and in the last print, the function uses "cout", that prints area variable value.
8 0
3 years ago
Which is most harmful computer virus define​
Ganezh [65]

Answer:

Spyware is the most harmful virus.

It enters into someones computer as a spy and steals the ones personal information, data and other codes.

Explanation:

3 0
3 years ago
Which two tasks are associated with router hardening? (choose two.)?
nexus9112 [7]

Disabling unused ports and interfaces.

Securing administrative access.

Router hardening means that the router is secured against attacks as best as possible. Router hardening is one among the three areas of router security that must be maintained to secure an edge router at the network perimeter. Basically, router hardening secures from tough-to-crack passwords, to the shutting down of unnecessary interfaces, ports, and services. Look for any unused router interfaces and disable them by issuing the shutdown command. Disabling unused services typically include BOOTP, CDP, FTP, TFTP, PAD, and a few others. You can also disable administrative and management protocols currently not being  like HTTP or HTTPS, DNS, and SNMP.

8 0
3 years ago
What is the impact of information technology in your daily life?
yawa3891 [41]
Technology affects people's lives differently.
Some are bad and some are good.
But for me, technology gives us a chance to collaborate and connect even if we are miles away.
People are opening their mind to new kind of knowledge that can help us improve and grow.
3 0
3 years ago
Other questions:
  • How does the use of modules provide flexibility in a structured programming design?
    14·2 answers
  • How will a packet tracer environment be affected if a heater is added to a container named branch office and turned on?
    5·1 answer
  • Writenames of eight output device.​
    8·1 answer
  • Computers with more than ____ of ram work with the aero interface in windows 7 as shown in the accompanying figure.
    15·1 answer
  • A machine is classified as a compound machine if it?
    8·2 answers
  • Why it’s important to keep the standard internet protocol TCP/IP?
    11·1 answer
  • Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or
    5·1 answer
  • ARP request is send to
    12·1 answer
  • The analogy of a computer system is often used to illustrate the different parts of memory. The keyboard is where we encode new
    8·1 answer
  • Different search engines available on the internet​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!