1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudiy27
4 years ago
11

Jim has entered the age of each of his classmates in cells A1 through A65 of a spreadsheet. Which function should Jim use to fin

d the most common age of his classmates?
(A) =AVERAGE(A1:A65)
(B) =MODE(A1:A65)
(C) =MEDIAN(A1:A65)
Computers and Technology
2 answers:
telo118 [61]4 years ago
7 0
The best answer is A. Average finds the average of a set of numbers, mode finds the most commonly noted number, and median finds the middle value of all of the noted values. 

Hope this helps!
azamat4 years ago
3 0
Hello there,

Your correct answer would be <span>(A) =AVERAGE(A1:A65)

Hope this helps!</span>
You might be interested in
Identify the type of error described
Arturiano [62]

Answer:

ZeroDivisionError

ValueError

Explanation:

ZeroDivisionError occurs when you attempt to divide a number by 0.

ValueError occurs when the argument passed into a function holds the wrong value. In this case, the string is not numeric which cannot be passed into the float() function.

Hope this helps :)

5 0
3 years ago
Give an example of SaaS (Software as a service) and explain why this can impact organisational security posture
lara31 [8.8K]

In the case above, An  example of SaaS (Software as a service) are DropBox, UserGuiding and Salesforce.

<h3>How does SaaS (Software as a service) impact organizational security posture?</h3>

Software-as-a-Service (SaaS) security posture management (SSPM) is known to  be a kind of a group that is made up of an automated security tools that is used for tracking security threats in regards to SaaS applications.

<h3>What is organization level security in Salesforce?</h3>

The organizational level is known to be one that gives room for a person to decide if and from where a given users can be able to access the system.

Note that SaaS platforms is made up of software that is said to be available via third-party and they include BigCommerce, Salesforce and others.

Learn more about SaaS from

brainly.com/question/24852211

#SPJ1

4 0
2 years ago
8.2 code practice edhesive
Helga [31]

Answer:

temperatures = []

i = 0

while i < 5:

   try:

       t = int(input('Enter a temperature: '))

       temperatures.append(t)

       i += 1

   except ValueError:

       print('Enter a number')

print(temperatures)

Explanation:

Hope this helps!

3 0
3 years ago
Describe in detail how TCP packets flow in the case of TCP handoff, along with the information on source and destination address
Ilya [14]

Answer:

Following are the answer to this question:

Explanation:

There will be several ways to provide it, although it is simpler to let another front side Will work out a three-way handshake or transfer packages to there with a Server chosen. Its application responds TCP packets with both the destination node of the front end.

The very first packet was sent to a computer as an option. Mention, even so, that perhaps the end of the queue end remains in the loop in this scenario. Rather than obtaining this information from the front end like in the primary healthcare services, you have the advantage of this capability: its selected server helps to generate TCP state.

8 0
4 years ago
A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order
Novosadov [1.4K]

Incomplete question. Here's the full question:

Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.

This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?

<u>Explanation:</u>

Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.

For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.

3 0
3 years ago
Other questions:
  • Why is it important to bring standalone systems into the domain? 4?
    8·1 answer
  • You are reviewing the style sheet code written by a colleague and notice several rules that are enclosed between the /* and */ c
    12·1 answer
  • Your app needs to store the following information. For each type of information, decide whether you would use an array or a vari
    7·1 answer
  • Match the categories in the first column with examples in the second column.
    14·1 answer
  • What helps companies and organizations to target masses of people, provide 24/7 services, and deliver better marketing in a chea
    6·1 answer
  • Write a program that prompts the user to enter an oligonucleotide sequence, such as TATGAGCCCGTA.
    7·1 answer
  • What is the difference between an html opening tag and a closing tag?.
    7·1 answer
  • Fill in the blanks to help write this professional e-mail:
    6·1 answer
  • True or false: If you have a 32-bit CPU architecture, it's recommended to use a 64-bit operating system.
    14·1 answer
  • a) consider the binary number 11010010. what is the base-4 representation of (11010010)2? (there is a way to do this without con
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!