1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Agata [3.3K]
3 years ago
6

The =COUNT function calculates what value?

Computers and Technology
2 answers:
Phoenix [80]3 years ago
8 0

Answer:

the answer is C.

Natalka [10]3 years ago
4 0

c is the anwer of question

You might be interested in
What offers backup services that use cloud resources to protect applications and data from disruption caused by disaster? Multip
sattari [20]

Answer:

The correct answer to the following question will be "Disaster Recovery as a Service (DRaaS)".

Explanation:

DRaaS seems to be a cloud services term used only to secure an infrastructure or data through human catastrophe or interruption of service at any destination by allowing a complete recovery throughout the cloud.

  • DR seems to be a security or management preparation field which seeks to protect an organisation from those in the consequences of major negative experiences.
  • This provides offsite backups which use storage resources to defend programs including assets from disaster-induced destruction.

8 0
3 years ago
Which of the following is not an advantage of concurrent design?
viva [34]

The answer I believe is B

7 0
3 years ago
Read 2 more answers
Which numbering system is used for some network addresses, to describe colors
FromTheMoon [43]
Hexadecimal it describes locations in memory
5 0
3 years ago
Default tab stops are set in word every ___________ inch.
iren [92.7K]
They are set every 1 inch.
6 0
3 years ago
How does coding work on computers?
sleet_krkn [62]
Coding works through programming/programs. Programs have different coding languages, and text files. The code within the file is known as the "source CODE" this code is used in different ways, causing for the possibility of separate binary files that computers can directly run. Hope I helped.

5 0
3 years ago
Other questions:
  • "what should you do if the system continually reboots and you can't read the error message produced on a blue screen
    11·2 answers
  • What will the output be from the following program?
    5·1 answer
  • Rhea has been asked to interview the new CEO of an energy company. She has scheduled a meeting with him in the company’s meeting
    9·2 answers
  • (25 POINTS)Which statement best reflects the importance of following safety guidelines?
    8·2 answers
  • Lee has changed the style of his table to make the header row stand out. Next, he wants to center the text in the header row and
    11·2 answers
  • A ……………………………is used to verify the identity of a website and is issued to the owner of the website by an independent and recogni
    7·2 answers
  • Who Is faster sonic or flash well it all depends on which version of sonic your talking about like for example video game sonic,
    14·1 answer
  • Explain how communication facilitate cordination​
    14·1 answer
  • You should move around and take a rest for 30 minutes every 5 minutes.<br><br>True Or False​
    9·1 answer
  • The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the op
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!