1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
beks73 [17]
4 years ago
6

Select the correct answer from each drop-down menu. Which IF formulas are valid? _____ and _____ are valid IF formulas.

Computers and Technology
1 answer:
Lyrx [107]4 years ago
4 0

Answer:

=IF(D3>50; E3; F3) AND =IF(A1>60;"Pass";"Fail")

Explanation:

An IF structure is built following this pattern:

IF(TEST;IFTRUE;IFFALSE)

These are the only options in the given drop-down menus what comply with this pattern.  All others are not following this pattern.

The computer will do the test and if the result is true will apply the IFTRUE value, otherwise will apply the IFFALSE value.

You might be interested in
True and false 1. Trace topology is also referred to as tree bus topology. ​
algol13

Answer:

Trace topology is also referred to as tree bus topology.

Explanation:

6 0
2 years ago
PLEASE HELP QUICK ASAP NO LINKS PYTHON CODING
Mademuasel [1]

Answer:

its for the movement

Explanation:

6 0
3 years ago
Read 2 more answers
Write a Temperature class that will hold a temperature in Fahrenheit and provide methodsto get the temperature in Fahrenheit, Ce
julsineya [31]

Answer: Thermometer

Explanation:

5 0
4 years ago
How would you define the rule of thirds?
omeli [17]
C ‘this is where you should place the
5 0
4 years ago
A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
mel-nik [20]

Answer: True

Explanation:

Digital forensic analysts are the people who examine digital devices such as cameras, mobile phones and computers in order to get evidence of crime.

The evidence gotten by them can then be used to provide support to criminal investigations and can also be given to the intelligence agencies. Their function is to get back and safeguard the digital data which are related to cybercrime investigations as well as criminal investigations.

6 0
3 years ago
Other questions:
  • using unsafe sites may be a. harmful to your computer c. okay as long as you don���t leave any personal information b. okay as l
    9·2 answers
  • Which of the following is an example of new and emerging classes of software?
    11·2 answers
  • Which person would be the best fit for a career in the information technology field?
    14·1 answer
  • 2 A_______<br> uses graphics or pictures to help the user navigate and<br> access programs
    14·1 answer
  • A Raycast returns a float that tells you how far away an Object is
    8·1 answer
  • What are three key characteristics of an OS process?
    11·1 answer
  • Question #2
    15·2 answers
  • 0 % 3? Is it 0 or undefined? (% is mod)
    9·1 answer
  • What are three advantages of using enterprise software in an organization?
    10·1 answer
  • How do you believe cryptocurrency work shape the next 10 years
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!