1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandr82 [10.1K]
3 years ago
15

Use a VLOOKUP function in cell I5 to identify and calculate the federal withholding tax. Use the tax rates from the range D21:E2

5. The VLOOKUP function returns the applicable tax rate, which you must then multiply by the taxable pay.
In the Cell 'I5' of Sheet 'Payroll Data', the 'Formula Result Value' was not set to '104.35'.


Calculate FICA in cell J5 based on gross pay and the FICA rate (cell B23), and calculate the net pay in cell K5. Copy all formulas down their respective columns to row 16.


In the Cell 'K9' of Sheet 'Payroll Data', the 'Formula' was not set to 'G9-I9-J9'.


In the Cell 'H13' of Sheet 'Payroll Data', the 'Formula' was not set to 'G13-B13*$B$24'.


In the Cell 'H16' of Sheet 'Payroll Data', the 'Formula' was not set to 'G16-B16*$B$24'.


In the Cell 'H9' of Sheet 'Payroll Data', the 'Formula Result Value' was not set to '350'.


In the Cell 'I7' of Sheet 'Payroll Data', the 'Formula Result Va
Computers and Technology
1 answer:
SVEN [57.7K]3 years ago
6 0
In the Cell 'H13' of Sheet 'Payroll Data', the 'Formula' was not set to 'G13-B13*$B$24'.
You might be interested in
A write the result P*=++j where j is 24
MariettaO [177]

Answer:

ang hrap nmn nyan

Explanation:

poede po

7 0
2 years ago
Lindsey also needs to calcite the commissions earned each month. If the company earns $200,000 or more in a month, the commissio
IrinaK [193]

Answer:

srry dont know

Explanation:

8 0
3 years ago
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
What does the asterisk (*) after select tell the database to do in this query?
OlgaM077 [116]

In the case above, The asterisk helps database or tell it to select all data that meets the criteria as stated in the query.

<h3>What does asterisk (*) mean in SQL?</h3>

The term means all columns. Note that The asterisk or star symbol ( * ) is a term that implies all columns in a given database.

Therefore, In the case above, The asterisk helps database or tell it to select all data that meets the criteria as stated in the query.

Learn more about asterisk from

brainly.com/question/1620017

#SPJ11

4 0
1 year ago
The ____ method returns an integer that represents the location of the substring within the string.
enot [183]

Insert Method

it is used to returns an integer that speaks to the area of the substring inside the string.

5 0
3 years ago
Other questions:
  • An anthropologist may try to learn why and how a culture develops.<br><br> A.true<br> B.false
    13·1 answer
  • A(n) ______ system is a set of programs that coordinates all the activities among computer or mobile device hardware. a. managem
    10·1 answer
  • Kelvin owns a small trading firm. Recently, he suspected that some of his employees were using fraudulent activities for their p
    5·2 answers
  • The following relation schema can be used to register information on the repayments on micro loans.
    13·1 answer
  • When you need to cut new external threads on a bolt, which of the following tools should you use?
    9·2 answers
  • What term is used to describe our connection with eachother through technology
    6·1 answer
  • What would be the best tool to display the following information from a basketball game?
    6·1 answer
  • Select the four bad password ideas.
    13·2 answers
  • Question 3 of 10<br> What was the fly in the ointment of Timmy's friendship with Rollo?
    10·1 answer
  • Common names for computer-based information systems are transaction processing, management information, ________, and executive
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!