1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
5

In the formula "=A3/B3", what part of the formula is the "/"? A)An operator B)An operand

Computers and Technology
2 answers:
Aleks [24]3 years ago
7 0

Answer:

An operator

Explanation:

The operator is the thing doing the work. The operand is what the work is being done on.

olga2289 [7]3 years ago
7 0

<u>Answer:</u>        A)An operator

<em>“/” is an operator. </em>

<u>Explanation</u>:

An operator performs operations on the operands. There operators which acts on <em>single operand and there are few operators who act on two or more operands</em>.

<em>For example, binary +, - , etc operates on two operand. </em>

<em>Eg. a+ b where + is an “binary operator” and a & b are operands.</em>

<em> ++, -- are unary operator which acts on single operand. </em>

<em>For eg: --p or p++ where p is an operand “—or ++” is an unary operator.</em>

In the given question “/” is a binary operator which acts on two operand namely <em>A3 & B3 (A3 and B3</em> points to cell value in excel and this operator returns <em>quotient from the divided result.</em>

You might be interested in
2 what is deep learning?
lozanna [386]

Answer:

a type of machine learning based on artificial neural networks in which multiple layers of processing are used to extract progressively higher level features from data.

5 0
1 year ago
The number of __________ to your website that had not visited prior to the time frame being analyzed.
liq [111]

Answer:

First Time Unique Visitor

Explanation:

I majored in

4 0
3 years ago
For each of the following SQL queries, for each relation involved,list the attributes that must be examined to compute the answe
Vlada [557]

Answer:

1. E.eid ,E.hobby, E.sal, E.did

2.E.eid , E.sal, E.hobby ,E.did , D.did, D.floor ,D.dname , D.budget.

3.E.eid , E.sal, E.hobby ,E.did , D.did, D.floor ,D.dname , D.budget.

4.E.eid , D.dname

Explanation:

The attributes that are examined for the query are the attributes of the table that are mentioned in the select statement and where clause.

So according to first query we are working on all attribues of Emp table so all of the attributes of Emp table are examined.In second query we selecting all attributes of both the tables hence all attributes of both the table and same in the next query.

In fourth query though the query is not complete where clause is missing but we have eid from Emp and dname from Dept tables for sure and the attributes mentioned in where clause will also be present.

7 0
3 years ago
Which command should you use to display both listening and non-listening sockets on your linux system? (tip: enter the command a
trasher [3.6K]

Answer: netstat -a

Explanation: The netstat -a command displays both listening and non-listening sockets.

3 0
2 years ago
Why is it important to use fillings,coating/icing,glazes or decorations for pastry products​
Marizza181 [45]

Answer:

Frosting improves the cake's appearance.

Explanation:

Special occasion cakes become more festive with frosting and decorations; and, Frosting improves the keeping the qualities of the cake by forming a protective coating around it, sealing in moisture and flavor and allowing it to be eaten over a couple of days.

7 0
2 years ago
Other questions:
  • How would you describe enterprise computing
    12·1 answer
  • When you are printing handouts, which of these can you do? A. Save paper by placing more than one slide per page. B. Check the f
    7·1 answer
  • Dora electronically transferred $591.68 from her checking account to Matt's checking account. In what column of the check regist
    14·2 answers
  • When you access the programs and documents on a computer by what way of icons is said to be employing
    6·1 answer
  • . In many instances an IP address is used to access a server rather than a URL because a URL is more difficult to set up and eas
    10·1 answer
  • Jody should select the
    5·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    12·1 answer
  • Which category does this fall in identity theft​
    6·1 answer
  • Which of the following is not an operating system a) boss b) window xp c) linux d) bindux​
    15·1 answer
  • 8. Choose the 3 correct statements for the code below.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!