1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Studentka2010 [4]
3 years ago
8

You wish to enter your exam scores in a spreadsheet. Which function will help you find how each subject’s score relates to the o

thers? The __function will help to identify where each subject’s score stands with respect to others.
Computers and Technology
1 answer:
tester [92]3 years ago
8 0

Answer:

Its the VLookup and the HLOOKUP.

Explanation:

And it depends upon the manner in which the marks are mentioned. If they are mentioned in row then we use Hlookup, and if in columns then we use vlookup.

And the syntax for vlookup is :

vlookup(lookup value, range containing the lookup value, column number in range containing the return value, approximate 0 or exact value 1)

You might be interested in
Assume that the reference variable r refers to a serializable object. Write code that serializes the object to the file ObjectDa
laiz [17]

Answer:

FileOutputStream out = new FileOutputStream("ObjectData.dat");

ObjectOutputStream ostream = new ObjectOutputStream(out);

ostream.writeObject(r);

Explanation:

For object serialization, we can use the writeObject method of java.io.ObjectOutputStream class.

The complete code fragment is as follows:

import java.io.*;

class Demo{

      public static void main(String args[]){

             try{

                  r = <Reference to Object to be serialized> ;

                 FileOutputStream out = new FileOutputStream("ObjectData.dat");

                 ObjectOutputStream ostream = new ObjectOutputStream(out);

                  ostream.writeObject(r);

                 ostream.close();

            } catch(Exception e){

                   e.printStackTrace();

            }

      }

}

5 0
3 years ago
On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance
sergey [27]

Answer:

The programming language is not stated; so, I'll solve this question using Java programming language

Comments are used for explanatory purpose

//Begin of Program

import java . util.*;

import java. math . RoundingMode;

import java . text . DecimalFormat;

public class keyfreq

{

private static DecimalFormat df = new DecimalFormat("0.00");

public static void main(String [] args)

{

 Scanner input = new Scanner(System.in);

 //Declare variable

 float f0;

//Prompt user for input

System.out.print("Enter Initial Key Frequency: ");

f0 = input.nextFloat();

//Initialize number of keys

int numkey = 1;

//Print first key frequency

System.out.print("Key Frequencies: " + df.format(f0)+" ");  

while(numkey<=4)

{

 //Calculate next frequency

 f0*= Math.pow(2,(1.0/12.0));

 //Print Frequency

 System.out.print(df.format(f0)+" ");  

  //Iterate to next frequency

 numkey++;

}

}

}

//End of Program

Explanation:

See Comments in the above program

See Attachment for source file

Download java
6 0
3 years ago
Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
Ann [662]

Answer:

The correct answer is A.

Explanation:

Given the example in the question, Howard is at the step of implementing security controls.

There are five official steps for the risk management framework.

  1. Categorizing The Information System: In this step, the IT system's objectives are assigned based on the current mission or project.
  2. Selecting Security Controls: After the risk assesment is done, the security controls for technical, hardware and software problems are decided according to the outcome.
  3. Implementing Security Controls: In this step, the points that were decided in the step before are put into action.
  4. Authorizing The Information System: Authorization for the risk management is approved and monitored.
  5. Monitoring Security Controls: The authorities keep monitoring the process and makes any necessary changes and updates.

The process that is explained in the question is step 3, which is given in option A.

I hope this answer helps.

5 0
3 years ago
Which type of connection to the Internet is capable of the fastest transfer rates
dem82 [27]

That's a fiber connection direct to the internet service provider,
and a whopping monthly charge.

5 0
3 years ago
Read 2 more answers
How are digital and analog data similar? How are they different?
bezimeni [28]
The difference between analog and digital is in how the information/data is measured: Analog technology uses data that is continuous and the goal is to capture a likeness of reality. Digital technology uses sampling to encode the data and then reproduces it as closely as needed.

Hope this help young children
3 0
3 years ago
Other questions:
  • What does the octal number 362 represent in the decimal system?
    13·1 answer
  • Shape: element::paintbrush: ..............
    7·1 answer
  • Damian uses a modem to connect to a dial-up network. Which statements are true of a modem?
    11·2 answers
  • Describe the GRANT statement and explain how it relates to security. What types of privileges may be granted? How are they revok
    15·1 answer
  • Disk ___________________ helps improve the speed and efficiency of a hard disk.
    6·1 answer
  • Which of the following are parts of the Physical Layer?
    9·1 answer
  • What is the quickest way to change the format of a table?
    8·2 answers
  • Match the example with the type of collection.
    15·1 answer
  • You have been on the phone with a user in a remote office for 30 minutes troubleshooting their minor desktop problem. No matter
    6·1 answer
  • GoodArray hackerrank solution for a number N, a goodArray is the smallest possible array that consists of only powers of two
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!