1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
15

You would like to find the average of cells C2, C3, and C4. What should the formula look like? = C2+C3+C4*3 =C2+C3+C4/3 =(C2+C3+

C4)/3 +C2+C3+C4/3
Computers and Technology
2 answers:
Bumek [7]3 years ago
8 0

Answer:

C2+C3+C4/3

Explanation:

The average of multiple cells/values/numbers could be calculated by just adding all values divided by the number of values added in the numerator.

Marizza181 [45]3 years ago
3 0

Answer:

c3 and c4 and c2 are different and same

Explanation:

average cells are ptoboxide

You might be interested in
What feature preserves your open apps and data, but allows another user to log in to his or her own session of the same computer
Hitman42 [59]

A feature that preserves open apps and data while allowing another user to log in to his or her own session of the same computer is: switch user.

<h3>What is a computer?</h3>

A computer is an electronic device that is designed and developed to receive data from an end user in its raw form (input) and processes these data into an output that could be used for other purposes.

Generally, all computers are designed and developed with a feature called switch user, so as to preserve open software applications and data while allowing another user to log in to his or her own session of the same computer simultaneously.

Read more on computer here: brainly.com/question/959479

6 0
1 year ago
A(n) ____________________ is hardware or software that blocks or allows transmission of information packets based on criteria su
QveST [7]

Answer:

The answer is "Packet Filter(144-145)".

Explanation:

This technique is used in firewalls, which monitors access to the network, track data transmission packets, transfer or stop based on IP protocols and ports.

  • This approach is often used to test modulation packets.
  • It also used to control performance and provides security.
  • This mechanism also used in the IPv6.
6 0
3 years ago
Information to develop a project network is collected from the.
Kryger [21]

Information to develop a project network is collected from the work breakdown structure

<h3>Work breakdown structure </h3>

Work breakdown structure (WBS)  is a structure showing the steps needed to be taken so as to complete a project.

WBS is presented in visual format and it is usually arranged based on hierarchy.

Information to develop a project network is collected from the work breakdown structure

Find out more on Work breakdown structure at: brainly.com/question/6197566

7 0
2 years ago
which of the following indicates that the loop should stop when the value in the quantity variable is less than the number 50​
yan [13]

Answer:

while (quantity >= 50)

Explanation:

Required

Stop when quantity is less than 50

To do this, we make use of a while statement and the syntax is:

while (condition){ }

If the loop should stop when quantity is less than 50; then it means the loop would continue when quantity is greater or equal to 50

So, we have:

while (quantity >= 50)

6 0
3 years ago
What steps can you take to secure your private information?.
pogonyaev

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

6 0
2 years ago
Other questions:
  • Select the correct answer.
    6·1 answer
  • When using a template to compose a memorandum which key on the keyboard moves the cursor to the next field
    15·1 answer
  • Before sharing a document, you must first save the document to
    12·1 answer
  • A self-confident person knows that:
    13·1 answer
  • The Python print function
    9·1 answer
  • What’s an example of software?
    6·2 answers
  • PLEASE HELP!! WILL MARK BRAINLIEST!!
    9·1 answer
  • How do you fix this!!!!
    5·1 answer
  • What feature is available to add a auggestion in the margin of someone else's document.
    11·1 answer
  • You can open a movie maker project file any time in a media player. (1 point) true false
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!