1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Genrish500 [490]
3 years ago
4

In cell G2, enter a formula using the AND function that includes structured references to display TRUE if a project has a [Proje

ct Type] of "Drama" and [Approved?] value of "No". Fill the range G3:G23 with the formula in cell G2 Excel does not do so automatically.
Computers and Technology
1 answer:
Firlakuza [10]3 years ago
8 0

Answer:

=IF(AND(H2="drama";I2="No");"TRUE";"FALSE")

Explanation:

For this example, we must use the formula IF in addition the formula AND, with this combination the result.

If the field H2 = drama AND the field I2 = NO, the field G2 it's going to be TRUE, If not, the field it's going to be FALSE.

We could use this formula as long as we want in our Excel.

For example: from cell G2 until cell G23.

You might be interested in
What type of attack is dependent on sending packets too large for the server to handle?
Art [367]
I think the answer is a kernel attack. Kernel attacks often send corrupted packets, but they also send large packets, allowing the server to crash and make an opening.
7 0
3 years ago
How computer viruses spread from one computer to another​
morpeh [17]
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
8 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
finlep [7]

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


5 0
4 years ago
Read 2 more answers
Write a program that assigns a value the value of 50000 to an integer variable x, assigns the value of x*x to an integer variabl
Allushta [10]

Answer:

Explanation:

The following code is written in Java and does exactly what the question asks. The variables are long variables instead of integers because integer variables can only be a maximum of 2147483647 and the product of these two variables is much higher than that.

public static void main(String args[]) {

               long x = 50000;

               long y = x * x;

               System.out.println(y);

       }

7 0
3 years ago
Drag the system component on the left to the device or program that fits with the system component.
Strike441 [17]

Answer:

A. Back up software - Utility software

B. Printer - Device drivers

C. Camera - Firmware

D. Television - Firmware

E. Games console - Firmware

F. Antivirus software - Utility software

G. Disk Cleaner - Utility software

H. Video Card - Device drivers

Explanation:

Computer system components are the physical or hardware and software parts of the device. It is a combination of system software like utility software, device drivers and firmware, application software, and the hardware components and kernel.

4 0
3 years ago
Other questions:
  • Which software is used to play, create, and modify audio and video files?
    7·2 answers
  • Which of the following will affect the size of your monthly mortgage payment
    8·2 answers
  • Developers and organizations all around the world leverage ______ extensively.
    9·2 answers
  • How to count how many uppercase letters in sentence in python?
    8·1 answer
  • What are some professionals that complete network administrator
    11·1 answer
  • Conduct research to determine the best network design to ensure security of internal access while retaining public website avail
    9·1 answer
  • Function of Napier bone any five​
    11·2 answers
  • Which of the following is true of equilibrium? *
    9·1 answer
  • Brainliest For Tascake Because People Texted Before Tascake Could<br><br> Hurry Tascake
    13·2 answers
  • 13. WHICH OF THE FOLLOWING IS INVOLVED IN CREATING A DOCUMENT? *
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!