1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
10

What formula would you enter to add the values in cells b4, b5, and b6?

Computers and Technology
1 answer:
Semenov [28]3 years ago
4 0
=SUM(b4:b6)  If it doesn't show the $ sign just make sure it's in currency :)  I hope this helped!! Good Luck!!! :)
You might be interested in
You're setting up offline conversion tracking. You need to to upload offline data into your Google Ads account. Which two format
ikadub [295]

Answer:

The two formats supported are C. Google sheets and D. CSV

Explanation:

Google Sheets, CSV (Comma Separated Value) files and Excel files are accepted for upload in the google ads account. To upload files,

  1. go to conversions and click on uploads (should be found on the left sidebar).
  2. Look for the + (plus) sign to begin your upload.
  3. Locate the location of the documents either on your local computer or sync with google sheets.
  4. Once the upload is complete, click the preview button to check the uploaded data to see it if it correct.
  5. As soon as you are satisfied, click on Apply to sync your data to your google ads account.
8 0
3 years ago
Open the site in your browser. (If any pop-up windows appear, think about what they indicate about the web site before you close
kati45 [8]

Answer:

The answer to the given question is 5-6 (trustworthy).

Explanation:

When visits any web site there are several information is given, We click on it shows some pop-up box. it is smaller than the whole windows. for example, If we want to download any free software. So we go on a software site and choose the version for software and click for download. when we click on download there is a pop-up window open to provide the details of the software and has a one-button when we click on the button it downloads the software. If we cancel the pop-up window by click on the cancel /close (X) button it will close the window.

So the pop-up windows are very trustworthy.

5 0
3 years ago
Is there such a thing as an ethical reason for unauthorized access to a computer system?
OLga [1]

Meaning of key word here is "unauthorized": We don't have access to use the system. But you are try to accessing an Unauthorized system which is illegal, can be ethical. I think, although not legal in point of where you have to decide of right and wrong. Like if you want to getting information from criminals personal file to catch him then i would be right.

Yes if an administrator want to fix a problem something going on in his/her network wrong,then he/she can access the systems which is attached to network. Like if somebody is trying to access your's network or wifi getting password then you can stop to them use ethically,stop her/him system access to attaching your's network.

6 0
2 years ago
Secure software development: a security programmer's guide by jason grembi isbn-10: 1-4180-6547-1, isb-13: 978-1-4180-6547
a_sh-v [17]

Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

<h3>What is secure software development practices?</h3>

Secure software development is  seen as a method that is used form the creation of a lot of software that uses both security into all of the phase of the software development making cycle.

This book is known to be  A Programmer's Guide that can be able to  leads readers in all of the tasks and activities that one can do to be successful computer programmers and it is one that helps to navigate in the area of reading and analyzing requirements as well as choosing development tools, and others.

Hence, Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

Learn more about  Secure software development  from

brainly.com/question/26135704

#SPJ1

7 0
1 year ago
Modern CPUs need only a few ___________ to execute an instruction when all operands are in its registers.
zysi [14]

Answer:

Nanoseconds.

Explanation:

A scheduling computer system refers to an ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.

Modern CPUs need only a few nanoseconds to execute an instruction when all operands are in its registers.

In terms of the scheduling metrics of a central processing unit (CPU), the time at which a job completes or is executed minus the time at which the job arrived in the system is known as turnaround time.

Generally, it is one of the scheduling metrics to select for optimum performance of the central processing unit (CPU).

6 0
2 years ago
Other questions:
  • Which type of connection to the Internet is capable of the fastest transfer rates
    14·2 answers
  • Shortcuts can help you complete spreadsheet tasks more efficiently. True False?
    7·2 answers
  • Which keys should you press to insert a comment? Ctrl+Alt+I Ctrl+Alt+C Ctrl+Alt+O Ctrl+Alt+N Ctrl+Alt+M
    15·1 answer
  • State 3 file formats explain them in an understanding manner apart from Microsoft word and PDF
    5·1 answer
  • What are the two ways to print a document?
    11·1 answer
  • So I was looking at my profile and it says i'm a brainly PLUS member didn't sign up for it tho. Any ideas why this could have ha
    14·2 answers
  • Peripeteia is also referred to as __________.
    5·2 answers
  • Silas develops this algorithm to compute the calories burned for an activity for a given number of minutes and body weight: If t
    6·1 answer
  • Point to ______ of a cell to fill the cell to the right or down.
    10·2 answers
  • In Fantasy Football, participants compete against one another by choosing certain players from different NFL teams that they thi
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!