1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
7

12. Kelly would like to know the average bonus multiplier for the employees. In cell C11, create a formula using the AVERAGE fun

ction to find the average bonus multiplier (C7:C10).
Computers and Technology
1 answer:
lana [24]3 years ago
3 0

Answer:

1. Divide each bonus by regular bonus apply this to all the data

2. In cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.

Explanation:

The average bonus multiplier can be found by dividing each bonus with the regular bonus applying this to all the data and then putting the average formula and applying it to the cells C7:C10.  

After dividing the bonus with regular bonus, in cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.

You might be interested in
Traceroute would be best suited for which of the following tasks?
sleet_krkn [62]
The answer is A, or Locating bottlenecks in a network.
3 0
2 years ago
What is an example of something that can be done through personal automation?
lions [1.4K]

Answer:

Turning your phone on low battery mode

Explanation:

4 0
3 years ago
What is personal computer?
Deffense [45]
A personal computer is a computer designed to be used by one person at a time.
7 0
3 years ago
Read 2 more answers
Which family of controls included in the risk management Infrastructure is related to preventing the use of unauthorized codes?​
goldenfox [79]

Answer:

Operational Security Control

Explanation:

The family of controls included in the risk management Infrastructure that is related to preventing the use of unauthorized codes is known as "Operational Security Control."

This is because Operational Security Control defines potency of controls which involves the access controls, including the use of unauthorized codes, authentication, and security measures made to networks, systems, and applications.

3 0
3 years ago
Which of the following provides tools for creating simple graphics in word processing documents?
katrin2010 [14]
I think it may be Clip Art.
6 0
3 years ago
Other questions:
  • A company needs to store its documents in one place, share news and information with all staff, and allow access for employees w
    7·2 answers
  • You manage an NLB cluster composed of three servers: Server1, Server2 and Server3. Your maintenance schedule indicates that Serv
    15·1 answer
  • Which of the following journals is not aimed at the public as well as scientists?
    7·1 answer
  • What do we call the distribution and access of illegal copies of digital books??
    9·2 answers
  • What computer worm was used to sabatoge iran's nuclear program?
    11·1 answer
  • Hi! I'm Kayla! I was wondering who does homework on the weekends... anybody?? I guess almost everyone, including me. Anyways, le
    13·2 answers
  • What is the result of the following code?<br><br> x=7//2+10%2**4<br><br> print(x)
    15·1 answer
  • How to check the at&amp;t internet speed on my computer
    9·1 answer
  • a cryptarithm is a mathematical puzzle where the goal is to find the correspondence between letters and digits such that the giv
    14·1 answer
  • when using screwdrivers you should always be aware that the screwdriver blade might slip out of the slot and strike you in the .
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!