1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Doss [256]
3 years ago
12

Assume that cell F5 to F10 In a spreadsheet contains numeric value of salary earned by some workers and cell F12 contains the va

lue of 5%.Write a formula that will be used to increase the value stored in the cell F5 by 5%?​
Computers and Technology
1 answer:
snow_tiger [21]3 years ago
5 0

Answer:

=F5*$F$12+F5

Explanation:

If we want to increment the salaries in the cell F5, we must multiply the cell F5 by cell F12, and then we must sum that result.

If we want to drag the formula from the cell F5 to F10, we must use the dollar symbol $ to apply the same percent in our formula.

For example:

F12 = 5% = 0.05

F5 = 10,000

=F5*$F$12+F5

=10,000×0.05+10,000 = 10,500

You might be interested in
List three uses of the INTERNET
dedylja [7]

Answer: these are the main top 3 uses of the internet

1. Info of hobbies and interest

2. research general information

3. News

thx <3

4 0
3 years ago
Read 2 more answers
Which layer concerns the gateway to the network?
elena-s [515]
The gateway works at the network layer is the Layer 3 of the OSI Model. The door is utilized when transmitting parcels. At the point when parcels are sent over a system, the goal IP address is inspected. On the off chance that the goal IP is outside of the system, then the bundle goes to the door for transmission outside of the system.
4 0
4 years ago
Which file is used to determine which tty devices the root user is allowed to log in to?
aleksley [76]
The <span> file that is used to determine which tty devices the root user is allowed to log in to is: </span><span>/etc/<span>securetty
</span></span>etc/securetty<span> is consulted by pam_securetty module in order to decide from which virtual terminals root is allowed to login from. You can limit the access to root account by </span>disabling root logins at the console by editing the /etc/securetty<span> file. </span>
7 0
3 years ago
Which of the following refers to the data analysis software and interactive software that allow managers to conduct analyses and
Elena-2011 [213]

Answer:

C. Marketing decision support system (MDSS)

Explanation:

Based on the information provided within the question it can be said that the software that is being described in the question is called the Marketing decision support system (MDSS). This is a system that is used in order to be able to manipulate a database in order to analyze various different business scenarios that would help a manager make a management decision with this information.

4 0
3 years ago
PLS HELP I WILL GIVE BRAINLY<br><br> how does gg docs show the benefits of Cloud computing?
bija089 [108]

Answer:

Explanation:

Go0gle Docs is a web-based office suite composed of three key components: the G0ogle Docs word processing program, Go0gle Spreadsheets spreadsheet program, and G0ogle Presentations presentation program. But Go0gle Docs isn't the only cloud computing application available today. Go0gle Docs is a type of cloud computing.

The simplest form of cloud computing is Software as a Service (SaAS). One such good example of SaAs is go0gle docs. Go0gle Docs, Sheets, and Slides are included with Go0gle Drive Enterprise, allowing for collaborative editing of documents, spreadsheets, presentations, drawings, forms, and other file formats. Users may also view and collaborate on Microsoft Office files as well as 60+ other file types with Drive Enterprise.

(Hope this helps can I pls have brainlist (crown) ☺️

6 0
3 years ago
Other questions:
  • How many inputs are included in the following requirement? REQUIREMENT: Write a program that asks the employee for their age. Th
    6·1 answer
  • How to see if your computer has bluetooth?
    6·1 answer
  • What are the three modes of the 3D transform manipulator
    12·1 answer
  • How to solve 3(x - 2) = 9x<br><img src="https://tex.z-dn.net/?f=3%28x%20-%202%29%20%3D%209x" id="TexFormula1" title="3(x - 2) =
    14·1 answer
  • If you hear that an airplane crashes into the Empire State Building, and you immediately think of the 9/11 terrorist attack on t
    9·1 answer
  • The first thing you must consider in any type of communication is ______.
    9·2 answers
  • Briefly explain why corporations are increasingly interested in using Unix or Linux for their operating systems.
    5·1 answer
  • Point out the wrong statement:
    7·1 answer
  • Given the following code, assume the myStack object is a stack that can hold integers and that value is an int variable. Assume
    8·1 answer
  • Enter the word that belongs in the blank:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!