1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
3 years ago
15

Ellen wants to find out what her median monthly spending is.The monthly totals for her spending appear in the range A10:L10.Whic

h of the following is NOT a way to enter the MEDIAN function into her database?
A) Type =MEDIAN(A10:L10) into an empty cell.
B) Select the range A10:L10, click the Quick Analysis button, click TOTALS, and then click Median.
C) Click the More Functions button in the Function Library group on the FORMULAS tab, point to Statistical, and then click MEDIAN.
D) Click the Insert Function button in the Function Library group on the FORMULAS tab, scroll the Select a function list, then click MEDIAN.
Computers and Technology
1 answer:
Fed [463]3 years ago
3 0

Answer:

B

Explanation:

B. Select the range A1:L10, click the Quick Analysis button, click TOTALS, and then click Median.

Found it here might help with other questions on your test.

https://quizlet.com/386793520/cit105-excel-quiz-3-flash-cards/

You might be interested in
Stuck on where to go with this one.
garri49 [273]

1

7

6 I think how many do you have to answer

8 0
3 years ago
What should htc's os strategy be? should it stick with windows mobile and android? should htc build its own platform? add/drop o
rosijanka [135]

I say windows, since it is very common.

8 0
3 years ago
Straight dinosaur walks out of woods : RAWWRRRR
Lena [83]

Answer:

These type of people on brainly are what I live for L M A O

Explanation:

4 0
3 years ago
Read 2 more answers
E-mail is an efficient means of disseminating information quickly and inexpensively. However, HIPAA regulations affect e-mail us
oksano4ka [1.4K]

Sending potentially sensitive information by email

Potentially sensitive information can be sent via Email only if the Email is encrypted

Explanation:

No doubt Email is an inexpensive efficient means of communicating quickly. But it is prone to hacking and it is not a secure mechanism. In order to add security ,the Email needs to be sent in an encrypted form. Banking and HIPAA regulations require the emails to be sent in encrypted form as it is a secure mechanism. Even if one has the consent from the client , the Email has to be in encrypted. Even if the Organization's e-mail system has appropriate firewalls and related infrastructure , the golden rule is to send encrypted format Emails.

7 0
4 years ago
A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not
Ghella [55]

Answer:

B. NIDS

Explanation:

From the question we are informed about A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. The BEST device to meet these requirements is NIDS. Network intrusion detection system known as "NIDS" can be regarded as a system that can attempt in detection of hacking activities as well as denial of attack on computer network. It can monitor network traffic and can as well detect malicious activities through identification of suspicious patterns in any incoming packet.

3 0
3 years ago
Other questions:
  • Select the correct answer from each drop-down menu.
    10·1 answer
  • The scope of a variable declared within a for() loop is:
    6·1 answer
  • Define the following concepts: computer network, network architecture, protocol, and multilayer protocol.
    11·1 answer
  • Which of the following is not a metamorphic agent?
    8·2 answers
  • What are the uses of plotters​
    7·2 answers
  • Please help i will give brainiest. Plus 30 points
    9·1 answer
  • Which option should you select to ignore all tracked changes in a document? To ignore all tracked changes in a document, you sho
    14·1 answer
  • Which web browser was created by Google?
    5·2 answers
  • // This program assigns values to two variables // and performs mathematical operations with them public class DebugFour1 { publ
    7·1 answer
  • Is there actually a difference between left and right twix
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!