1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aalyn [17]
3 years ago
15

A report has a column of totals, with each total adding to the cell above it. What kind of calculated figure is this?

Computers and Technology
1 answer:
Alexxx [7]3 years ago
3 0

ANSWER:

The correct answer is Running Sum.

Explanation:

A report has a column of totals, with each total adding to the cell above it. Such type of calculated figure is called the Running Sum.

Running sum is also called the Partial Sum. In such type of summation, the values in the sequence is added to get a final result and then if a new number comes, it is again added to the grand sum, and in this way the sequence continues. Every new entry is added to the previous sum to get another sum.

You might be interested in
How can information technology transform the way business processes in an organization
timurjin [86]

Answer:

1. Through cooperation.

2. Understanding the market and the organization.

Explanation:

Information Technology can transform the way business processes in an organization only if there is cooperation in the company. The cooperation is that everyone is to agree on the change that it is going to cause.

An information Technologist can change the way business process if he or her understand the maker of the company and the company.

The major point is this:

1. The company must cooperate.

2. Everybody must accept change for it to grow higher.

3. Understand the market of the company and

4. understand the company and how they operate and then change and replace the parts that need replacement.

6 0
2 years ago
a circuit has an inductor with an inductive reactance of 230 ohms. this inductor is in series with a 500 ohm resistor. if the so
Amanda [17]

Answer: attached below

Explanation:

8 0
3 years ago
Give me the answers to all the tasks
enot [183]
Task one; Immersion and Interaction are most important for virtual reality to provide a smooth and enjoyable experience for the user

For task two the multiple choice on slide 5 has the answers to the quiz
5 0
1 year ago
A (n) _____, similar to a trojan horse, installs monitoring software in addition to the regular software that a user downloads o
galina1969 [7]

Answer:

Spyware

Explanation:

Internet is a type of computer network that allow device communicate with each other world wide. So, it is not the correct option.

Worm: this is a standalone malware computer program that replicates itself in order to spread to other computers. It spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. The major feature of a worm is ability to replicate on it own. So, it is not the correct option.

Bot: this is a software application that runs automated tasks. So, it is not the correct option.

Middleware: this is software that lies between an operating system and the applications running on it, enabling communication and data management. It provides services to software applications beyond those available from the operating system. So, it is not the correct option.

Spyware: this is the correct answer. Spyware is similar to trojan horse because it hides itself in a system and a user may not know that it exist on the system. Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information without knowledge of the user.

5 0
3 years ago
Read 2 more answers
All of the following are computer hardware servicing tools EXCEPT​
andrey2020 [161]

Answer:

Shovel

Explanation:

7 0
2 years ago
Other questions:
  • WHEN COPYING EXISTING SPREADSHEET DATA TO A WORD DOCUMENT YOU NEED TO SELECT?
    12·1 answer
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • Kiera is building a new computer and wants to make sure she has an adequate power supply for all the new equipment she is purcha
    15·2 answers
  • What is the easiest way to create a diverse set of cover pages?<br><br> Word 2016
    11·2 answers
  • What are some things that games were historically used for?
    7·1 answer
  • Use Spreadsheet Functions and Formulas
    6·1 answer
  • Who invented computer ?​
    9·2 answers
  • Define the terms network, LAN, WAN, and Internet.
    11·1 answer
  • SINCE I CANT SEE IT KANG LOOK
    6·2 answers
  • python. create a program that asks the user to input their first name and their favorite number. Then the program should output
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!