The compound condition are:
- 7<12 or 50!=10 is false
- 7<12 and 50<50 is false
- not (8==3) is true
<h3>What is compound condition?</h3>
A compound statement is known to be one that shows up as the body of another statement, e.g. as in if statement.
The compound condition are:
- 7<12 or 50!=10 is false
- 7<12 and 50<50 is false
- not (8==3) is true
Learn more about compound condition from
brainly.com/question/18450679
#SPJ1
Answer:
Eraser tool -removes the unwanted part of the drawing.
Row -horizontal space running from left to right.
Text -Primary component of a multimedia.
Drawing Area -Working are of ms point program.
I hope this helps!! Correct me plz if I'm wrong. If I'm right, could you mark me as brainliest?
Based on the given spreadsheet, the database function that needs to be entered into cell I6 to find the average salary of all full-time employees is =AVERAGEIFS(D5:D34,B5:B34,"FT",C5:C34,">=1")
<h3>What does the AverageIfs formula find?</h3>
You can use the AverageIfs formula to find the average of a specific group of numbers from a spreadsheet based on the shared categories that these numbers fall under.
After typing in the =AverageIfs function, you then input the range from which the category will be specified. In this case that is D5:D34. The next entry would be the range the category is picked from which is B5:B34. The function will be FT for Full time workers.
Then use C5:C34 to find out the number of dependents that are equal to or greater than 1.
The digit returned is the average salary of all full-time employees.
Find out more on the AverageIf function at brainly.com/question/13661607
#SPJ1
Answer:
A closed port that can not receive request from authorized users.
Explanation:
Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.
Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.
DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.
B. only accesible over the internet