1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
2 years ago
14

How to find the average range of cells A1:A10

Computers and Technology
1 answer:
Ad libitum [116K]2 years ago
5 0
Go to a blank cell and type

         =AVERAGE(A1:A10)      then  <ENTER>

As if by magic, the average of those cells
will appear where you typed the formula.
You might be interested in
Which of the following is an example of Boolean operator?
Paraphin [41]

Answer:

BUT APEX Verified

Explanation:

7 0
3 years ago
Read 2 more answers
Which security option should be used to ensure the integrity and validity of an Access database?
Fynjy0 [20]

Answer:

The best security which could be used to ensure integrity and validity of Access database is:  

O. database password

Explanation:

Database password is the only option that best guarantee the integrity of an Access database due to the fact that, it limits the number of people who would be able to have access to it. This password is an administrative right given to those who are meant to access it and it is expected to be renewed every few months (probably every 3 months).

<em>Without the password, no other person can be able to login. Also, no two individual can be able to login in same time using same credential login details assigned (that is, in scenario of using the same Username and password)</em>

3 0
2 years ago
Read 2 more answers
Write a Console program, let users to enter prices calculate subtotal, tax, and total.
Phantasy [73]

Answer:

Explanation:

This is a project I already submitted, but I never received feedback. All my upcoming assignments will be based on this, so I wanted to make sure it is correct. I got this program to work as far as calculating the information, but I was hoping someone could please let me know if it meets the parameters/requirements?

I did attempt it. It works and adds the items exactly how the example showed in the video. However, I wanted to make sure my code is solid, and not just a mishmash or working because I got lucky, and if there is a better more solid way to do this I want to make sure I can. I do want feedback so I can learn and get better and I am trying my hardest. I always right out all the code I see here and try it and learn what it does piece by piece, because it helps me learn and improve. I also want to make sure it is going to work once I start the code for the next half of the requirements.

i cant really help they dont let us put codes on here

6 0
2 years ago
Conformity is the acceptance of culturally approved goals and the means for achieving these goals.
docker41 [41]

Answer:

The following statement is "True".

Explanation:

Conformity acceptance word divided into two parts that are Conformity and acceptance. Conformity stands for change in behavioral change or conviction. Or considered the stress of the party. and the acceptance stands for thinking and trusting across community standards.  behaving and believing along social lines.

In other words we can say that achieving cultural goals via channels that are culturally approved and utilizing traditionally unorthodox methods to achieve cultural goals.

6 0
3 years ago
Read 2 more answers
Sally is editing her science report about living things. She needs to copy a paragraph from her original report.
nignag [31]

Answer:

Open Original document = 1

Highlight text = 2

Press Ctrl+C keys = 3

Switch view to new document = 4

Place cursor where text needs to go = 5

Press Ctrl + V = 6

Explanation:

I hope this helps!

4 0
3 years ago
Read 2 more answers
Other questions:
  • You can drag a cell to a new location by pointing to the cell border until the pointer displays a _______ arrow, and then draggi
    9·2 answers
  • To define constructors and member functions outside of a class's original scope, the operator can be used.
    11·1 answer
  • The __________ vulnerability assessment is a process designed to find and document selected vulnerabilities that are likely to b
    15·1 answer
  • It is a good practice to use 3d to plot a single dimensional data in storytelling.
    9·1 answer
  • Create an application containing an array that stores eight integers. The application should call five methods that in turn (1)
    7·1 answer
  • What does Boot Partition mean?
    7·1 answer
  • A(n) ____ uses the communication interface to request resources, and the server responds to these requests.
    15·1 answer
  • Hypercompetition implies that any architecture must be designed with maximum flexibility and _____ to ensure it can handle the i
    6·1 answer
  • Copyright laws protect:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task a
    6·1 answer
  • in the topology configuration, hosts are connected to each other through a central controller which assumes all responsibility f
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!