1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Molodets [167]
3 years ago
15

What is the formula for calculating the average of cells C2 through C30?

Computers and Technology
1 answer:
BARSIC [14]3 years ago
6 0

For calculating the average of cells  C2 through C30 use the COMPUTE statement = AVERAGE(C2:C30).

Explanation:

  • Excel a software program created by Microsoft that uses spreadsheets to organize numbers and data with formulas and functions.
  • Excel analysis is ubiquitous around the world and used by businesses of all sizes to perform financial analysis.
  • The AVERAGE function calculates the average of numbers provided as arguments.
  • To calculate the average, Excel adds the numbers together and divides by the total number of values supplied. AVERAGE can handle up to 255 individual arguments, which can include numbers, cell references, ranges, arrays, and constants.
  • To perform the average formula in Excel, enter the values, cells, or range of cells of which you're calculating the average in the format, =AVERAGE(number1, number2, etc.) or =AVERAGE(Start Value:End Value). This will calculate the average of all the values or range of cells included in the parentheses.

You might be interested in
Which of the following describes the IP address of a router to which packets destined for a remote network should be sent by def
Elena-2011 [213]

The term that describes the IP address of a router to which packets destined for a remote network should be sent by default is the a gateway of last resort.

<h3>What is 'Gateway Of Last Resort'? </h3>

A Gateway of Last Resort is known to be the Default gateway and this is said to be a route that is known to be often used by the router if no other known route is seen to transmit the IP packet.

Note that Known routes are seen in the routing table. but, any route not known by the routing table is said or known to be forwarded to the default route.

Hence the primary function of a router is so that it can forward packets toward a given destination.

Therefore, The term that describes the IP address of a router to which packets destined for a remote network should be sent by default is the a gateway of last resort.

Learn more about IP address from

brainly.com/question/24930846

#SPJ1

3 0
1 year ago
How do you answer a question on here
Monica [59]
Didn’t you just make a question right now?
4 0
3 years ago
Read 2 more answers
A[n] _______________ is a hacker whose intention is the exploitation of a target computer or network to create a serious impact,
Margarita [4]
Cyberterrorist. They use the internet to hack into the government and private computer system which cripples the military.

8 0
3 years ago
One of the earlier applications of cryptographic hash functions was the storage
RoseWind [281]

Answer & Explanation:

1.

_Attack A: One way property of hash means that we can't find the input string if given the hash value. The calculation of hash from input string is possible but it is not possible to calculate the input string when given the hash. If the hash function is properly created to have one-way property then there is no way of finding the exact input string. So this attack won't work as the one-way property of hash function can't be broken if hash function is properly created.

_Attack B: Suppose h() is the hash function. And h(x) = m where x is the string and m is the hash. Then trying to find another string y such that h(y) = m is called finding out the second pre-image of the hash.

Although we can't know the exact initial string for sure, we can by using brute force method find out a second pre-image.

This attack will take a very long time. It has the time complexity of 2^{n} . It requires the attacker to have an idea about the kind of passwords that might be used and then brute force all of them to find string that has the same hash. Each try will have a chance of 1/2^{n}  to succeed.

Rainbow attack using rainbow table is often used for such brute force attack. This comprises a rainbow table which contains passwords and their pre-hashed values.

Therefore, it is not possible to determine the second preimages of h so easily.

_Attack C: Collisions refer to finding out m and m' without knowing any of them. Finding out collisions is easier than finding preimages. This is because after finding out 2^{n}  pairs of input/output. The probability of two of them having the same output or hash becomes very high. The disadvantage is that we can't decide which user's hash to break. However if I do not care about a particular user but want to get as many passwords as possible, then this method is the most feasible.

It has time complexity of 2^{n} /2.

Hence, this is the attack which has most success rate in this scenario.

2.

The brute force way of finding out the password usually involves using a rainbow attack. It comprises a rainbow table with millions of passwords and their hashes already computed. By matching that table against the database, the password can be recovered.

Therefore it is often preferred to salt the password. It means we add some random text to the password before calculating the hash.

The salts are usually long strings. Although users usually do not select long passwords, so a rainbow table with hashes of smaller passwords is feasible. But once salt is used, the rainbow table must accommodate for the salt also. This makes it difficult computationally. Although password might be found in the rainbow table. The salt can be anything and thus, make brute force a LOT more difficult computationally.

Therefore salt is preferred to be added to passwords before computing their hash value.

3.

A hash output length of 80 means there can be exactly 2^{80}  different hash values. This means there is at least one collision if 2^{80}+1 random strings are hashed because 2^{80}  values are used to accommodate all the possible strings. It is not hard with today's computation power do match against more than this many strings. And doing so, increases the probability of exposing a probable password of an user.

Hence, 80 is not a very secure value for the hash length.

6 0
3 years ago
Explain the difference between the = symbol in Java and in mathematics.
IRINA_888 [86]

Answer:

In maths the '=' sign tells us that the two integers or variables on either side are the same, wheras in Java the '=' sign means that you are assigning the variable on the left hand side it's value which will be on the right

4 0
2 years ago
Other questions:
  • Programmers use _____ languages in the Rapid Application Development (RAD) methodology to facilitate code reuse?
    5·1 answer
  • Among the web programming languages, css is used to define _____ of the web page
    5·1 answer
  • ​Which SQL keyword is used to search for records?
    8·1 answer
  • What is a current Gdp and what is a real Gdp?
    13·2 answers
  • What are listed in the vertical columns across the top of the Event Editor?
    5·2 answers
  • What is the difference between arithmetic and logical operations​
    8·1 answer
  • A potential customer wants to find out how blockchain can benefit their company and why they should use Accenture’s Multi-party
    8·1 answer
  • Question 5 (frue/False Worth 3 points)
    7·1 answer
  • What are the syntax of c programming language?
    9·1 answer
  • What is it called when you define a variable for the first time
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!