1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
3 years ago
9

Nancy needs to find the average of two numbers in the middle from an even count of numbers arranged in descending order. which s

tatistical function should she use in the spreadsheet?
A) mode
B ) rank
C) min
D) average
E) median
Computers and Technology
2 answers:
Rus_ich [418]3 years ago
7 0

i would say e. the median

Nataly_w [17]3 years ago
3 0

Answer:

The answer is E) median.

Explanation:

It is known that the median of a set of numbers is the number that is in the middle of the set once the numbers have been organized in descending order (this is when the data set is an odd number). When the number of data is an even number, the median will be the average of the two numbers that are in the middle of the data set, once they have already been organized.

You might be interested in
A user has been complaining that their wireless connection has been connecting and disconnecting too frequently. what command co
riadik2000 [5.3K]
<span>A user has been complaining that their wireless connection has been connecting and disconnecting too frequently. You could use the command </span><span>netsh wlan show wlanreport  to generate a detailed HTML based report for analysis of the wireless connection on their computer in the past.
</span>
<span><span>The netsh tool, is used to generate an interactive <span>WLAN Report</span></span>.
</span>

4 0
4 years ago
Select the correct answer.
Akimi4 [234]

Answer:

A. Alphanumerical key

Explanation:

pl please give me points

7 0
3 years ago
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow the
Anika [276]

Answer:

Possessed objects

Explanation:

Objects that are carried around by users to identify themselves with and to allow them access into computer systems are called possessed objects. Examples of such objects are;

i. smart cards

ii. driver's license

iii. id cards

iv. smart keys

v. smart watches.

Possessed objects are not the only way to allow authentication. Other methods are through memorized information (such as passwords, PINs) and through biometric devices (such as face recognition and voice recognition devices).

5 0
3 years ago
Why would an IT technician ever have to change out a computer’s motherboard?
castortr0y [4]
Here are a couple reasons:
Integrated Ports Gone Bad.
Motherboard is fried from electrical charge.
New features of updates.
Hope this helps.
7 0
3 years ago
Read 2 more answers
When constructing policies regarding data _______________, it is important that these policies offer particular guidance on sepa
Rama09 [41]

Answer:

access

Explanation:

Managing users' access rights to digital resources within the organization's environment is a fundamental SoD control. As more services are requested by users, utilizing the built-in panels to check compliance with internal controls might become excessive. Companies require a comprehensive Identity Governance and Administration plan to monitor these user access and offer an authoritative source of identity definitions in order to ensure  SoD compliance.

6 0
2 years ago
Other questions:
  • How many packets does your computer send/receive in a single mouse click when you visit a website?
    6·1 answer
  • A ____ may be composed of a few individual objects or several complex groups of objects.
    9·1 answer
  • HELP ME PLEASE ASAP!!!
    13·2 answers
  • George enters the types of gases and the amount of gases emitted in two columns of an Excel sheet. Based on this data he creates
    6·1 answer
  • What do flowcharts communicate to programmers ?
    10·1 answer
  • What is the way to discover requirments for software projects ?
    14·1 answer
  • Why authentication processes and features important
    10·1 answer
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers.
    8·1 answer
  • 3 alternativas donde puedas utilizar la tecnologia que nos ayude a reducir el impacto ambiental al medio ambiente
    14·1 answer
  • What is the binary conversion of 179.187.223.21?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!