1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldi70 [24.7K]
3 years ago
10

if you wanted to round $3.99 located in cell b3, to the nearest dollar, what is the correct microsoft excel formula? a.=round(0.

b3) b.+round(b3,0) c.=round(3.99,b3) d.=round(b3,3.99
Computers and Technology
1 answer:
Murljashka [212]3 years ago
5 0
The answer is "b" the just due to the decimal places are 0, so it rounds to the nearest integer
You might be interested in
Heidi uses her computer to write articles for a newspaper. She uses a program to listen to the articles before she submits them
sasho [114]

Answer:

Speech synthesis or text-to-speech (TTS) program

Explanation:

A speech synthesis program is a program can convert a written text to audio. The program can recognize the text and present it in audio format with a human voice. Speech synthesis program can be found in Microsoft Word. We can go Review tab and find the "Read Aloud" option. We can selectively highlight the text in Word and click "Read Aloud". This will trigger the text-to-speech conversion process and produce the audio output of the highlighted text in human voice.

3 0
3 years ago
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
3 years ago
A Write about why it is important for a person to upgrade their job skills
Alexxx [7]

It is important for a person to upgrade their job skills because upgrading their skills will Increase their self-confidence, Helps to learn new techniques at work, Keep Your Knowledge Up-to-Date, increase your ability  in order to do your job well, and so on.

<u>Explanation:</u>

The most significant purposes behind abilities improvement in an association is for the development significant by and by and in an association. Workers need to remain learning so as to develop. At the point when you are going after another position, it's extremely significant that you can exhibit that you stay up with the latest. With certain callings, it's obligatory.

And, the more the abilities hole is developing, the more significant these three viewpoints become. This is on the grounds that we have to unmistakably comprehend whether it is information, expertise or capacity that should be created.

7 0
3 years ago
Many who enter the field of information security are technical professionals such as __________ who find themselves working on i
Fynjy0 [20]

Answer:

networking experts or systems administrators ,database administrators,programmers.

Explanation:

The people who enter in the field of information security are professionals in technical fields bu their work is totally into the field of security like working on security applications.They don't work on the traditional IT assignments such as developing software,apps,website etc.

3 0
3 years ago
You have installed a new sound card in your system, closed the computer case, and turned on the computer. Windows boots and you
ArbitrLikvidat [17]

The most likely problem which led to the lack of sound after the installation of the new sound card is that the '<em>sound card is not recognized or incompatible</em> '

  • The sound card is an hardware which is installed into a computer in other to allow the the system produce audio signal.

  • Without a sound card installed into a computer, then such computer would not be able to perform <em>audio</em> <em>input or produce audio signals</em>.

However, when a sound card is present and, the computer fails to produce audio signal, then the most likely problem is that, the <em>sound card installed isn't recognized</em>.

Learn more :brainly.com/question/25055825

8 0
2 years ago
Other questions:
  • The likelihood of the occurrence of a vulnerability multiplied by the value of the information asset - the percentage of risk mi
    12·1 answer
  • In the 2007/2010 version of Paint, which of the following tools are located in the View tab? (Select all that apply.)
    5·1 answer
  • Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per l
    6·1 answer
  • Choose all items that represent characteristics of an HTML element. used to include additional information in an attribute consi
    15·1 answer
  • Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s person
    7·2 answers
  • True/False
    15·1 answer
  • Match each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back sc
    10·1 answer
  • Where does the list of incoming mail appear in gmail
    13·2 answers
  • What should you do if your computer is running slower
    12·1 answer
  • I will give brainliest to the best answer. what is a good screen recorder
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!