1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dennis_Churaev [7]
3 years ago
12

In VBA, write a code that does as follows: The first worksheet ("Ex. 1") has a list of 50 numbers. Write a program that will rea

d them into an array, then will calculate and output the following: - How many of the numbers are even (output in E2) - How many of the numbers are greater than 300 (output in E3) - The average of the numbers (output in E4) - In column B, output next to each number, the difference between that number and the average (can be positive or negative)

Computers and Technology
1 answer:
leva [86]3 years ago
8 0

The answer & explanation for this question is given in the attachment below.

You might be interested in
Which two ways should a developer create this functionality? A developer is asked to create a PDF quote document formatted using
bearhunter [10]

Answer:

The answers are A and C.

Explanation:

To create a PDF quote document formatted using the company's branding guidelines, and automatically save it to the Opportunity record the developer must;

A .) Create a Visualforce page with custom styling.

C.) Install an application from the AppExchange to generate documents.

4 0
3 years ago
Someone who wants the credential of skilled training but in less time than a four-year degree should consider
Katyanochek1 [597]
They should consider an associates degree or certifications. =)
8 0
4 years ago
The number of pixels displayed on the screen is known as
hodyreva [135]

Resolution is the correct option

Have a great day

5 0
3 years ago
The cybersecurity defense strategy and controls that should be used depend on __________. Select one: a. The source of the threa
muminat

Answer:

The answer is "Option C"

Explanation:

It is an information warfare-security method, that consists of a set of defense mechanisms for securing sensitive data. It aimed at improving state infrastructure security and stability and provides high-level, top-down, which lays out several new goals and objectives to be met within a certain timeline, and incorrect options can be described as follows:

  • In option a, These securities can't include threats.
  • Option b, and Option d both are incorrect because It is used in industry but, its part of networking.    
7 0
3 years ago
Which symbol should you use for entering a formula in a cell?
Ray Of Light [21]

Answer:LETTER B

Explanation:

8 0
3 years ago
Other questions:
  • Define the following term: - hue
    11·2 answers
  • The windows troubleshooting utility that identifies and eliminates nonessential files is called _____.
    15·2 answers
  • Which design element is used to convey smoothness or roughness in a design
    12·1 answer
  • As the network engineer, you are asked to design an IP subnet plan that calls for three subnets. The largest subnet needs a mini
    14·1 answer
  • A user purchased a new smart home device with embedded software and connected the device to a home network. The user then regist
    5·1 answer
  • JAVA
    7·1 answer
  • ________________, _______________ and ___________ are what you see when you open Excel
    15·1 answer
  • How to take a pic with a cumputer
    9·2 answers
  • Hello i need help whats -5 = 500
    13·2 answers
  • where element is the Hypertext Markup Language (HTML) element and _____ pairs define the styles that are applied directly to tha
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!