1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
3 years ago
14

How to find the average range of cells A1:A10

Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
5 0
Go to a blank cell and type

         =AVERAGE(A1:A10)      then  <ENTER>

As if by magic, the average of those cells
will appear where you typed the formula.
You might be interested in
Sonic the Hedgehog (1991)
e-lub [12.9K]

Answer:

What if we made a fast game?

Explanation:

The mascot is the person, animal or thing which brings good luck, just like Mario. However, this is not a problem with Sonic the Hedgehog. And the Hedgehog is powerful enough to cross any barrier. Hence tieing the collectibles is not required. And the Hedgehog is quite cute and domestic. But it moves only 10 meters per second if we are considering the maximum speed. Hence, the correct option is certainly what if we made a fast game? And this is option C.

7 0
4 years ago
2) What are two reasons we analyze algorithms?
Likurg_2 [28]
It’s a making sections about what algorithms to use
8 0
3 years ago
Read 2 more answers
A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to
Advocard [28]

Answer:

4. A Denial of Service attack (DDOS attack).

Explanation:

A DDOS attack is a malicious attempt to disrupt the normal traffic to a service.

In essence, it sends an enormous amount of requests to the service, until the server is overwhelmed because it can't handle that much traffic, and collapses in an overflow.

Thus, regular users are not able to access their services.

Usually, attackers use a botnet, a network of "zombie" computers that have been previously infected with a malware that allows the attacker to remotely control them, then the botnet starts to send a flood of traffic from different locations, and make the attacker difficult to detect or track.

6 0
4 years ago
Why must an rodc be able to connect to at least one windows server 2008 or higher domain controller?
raketka [301]
<span>Ensure that at </span>least one<span> writable </span>DC<span> must be running </span>Windows Server 2008<span> or higher before you can deploy a Read-Only-Domain-Controller.</span>
6 0
3 years ago
Select the correct answer from each drop-down menu. Kristian is a cybersecurity professional. She is writing a book called The D
Papessa [141]

Data sharing, maintaining security

<u>Explanation:</u>

Kristian is a cybersecurity professional. She is writing a book called The Door Toward Cybersecurity. Organizations should avoid any data <u>sharing or exchange</u> while servers are transmitting information. This will help organizations keep the information intact and maintain <u>security.</u> If any info or data shared when the servers are transmitting the info, then it may lead to the loss of security, and the information gets leaked. So it must be avoided to share while transmission of info using the servers.

3 0
3 years ago
Read 2 more answers
Other questions:
  • An employee is angry with his boss and wants to sabotage the company. To accomplish this he secretly changes some of the values
    7·1 answer
  • How can u refer to additional information while giving a presentation
    15·1 answer
  • What do you remember about the difference between Canadian and US dollar (which one is greater)? Also, explain which online tool
    6·1 answer
  • Two electronics technicians are measuring electrical quantities in circuits. Technician A says that copper, glass, porcelain, an
    11·1 answer
  • Create a structure named planet This structure will contain distance from Earth as an integer Atmosphere, language, people and p
    8·1 answer
  • What is an identified component of a software program that might allow a hacker or other intruder to gain entry and control of a
    10·2 answers
  • Write a program to generate a square wave with 80% duty cycle on bit P2.7 Microprocessor.​
    7·1 answer
  • This assignment will again take the form of a compare/contrast essay. You will use the fresco of Christ Teaching the Apostles in
    14·1 answer
  • Have all of my coins because i will delete acount there will be part 2, 3 , 4 ,5,6,7,8
    15·2 answers
  • Microsoft recommends when that you create passwords with upper and lowercase letters, numbers, symbols, and use at least _______
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!