1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeTakaya
3 years ago
7

Having data in a column formatted differently based on value is known as

Computers and Technology
1 answer:
ziro4ka [17]3 years ago
5 0
I believe it’s called Excel Formula
You might be interested in
Once a virus has been removed by your anti-virus program, all traces of it are gone from your computer.
pychu [463]
Im pretty sure that is false
5 0
3 years ago
How fast is a backwards long jump in Super Mario 64?
Kamila [148]

Answer:

I honestly don't know if you're being serious or not as this was a popular thing a few years ago, there are a few videos on yt, one particularly from 2008 that answers your question pretty well.

Clipping through a loading area requires at least 400 speed. But if you're just interested in the usual speed, there are multiple glitches to make him go faster than his usual x3.5 increased running speed (which is the speed you get at the LEAST when BLJing) but it seems the average is  -200. I've seen people get up to -900 though, so.

Basically, it can vary. In a very specific area he can get max momentum of -9373, which is probably the fastest even though it's against a wall.

6 0
3 years ago
In C complete the following:
Crazy boy [7]

Answer:

#include <stdio.h>

void printValues ( unsigned char *ptr, int count) // count is no of cells

{

 for(int i=0; i<count; i++) {

   printf("%d ", ptr[i]);

 }

}

int main ( )

{

 unsigned char data[ ] = { 9, 8, 7, 5, 3, 2, 1} ;

 printValues( data, sizeof(data)/sizeof(data[0]) );

}

Explanation:

Remember that the sizeof() mechanism fails if a pointer to the data is passed to a function. That's why the count variable is needed in the first place.

3 0
3 years ago
Two machines can finish a job in StartFraction 20 Over 9 EndFraction hours. Working​ alone, one machine would take one hour long
Alborosie

<em><u>Answer</u></em>

5 hours

<em><u>Explanation</u></em>

The two working together can finish a job in

\frac{20}{9}  \: hours

Also, working alone, one machine would take one hour longer than the other to complete the same job.

Let the slower machine working alone take x hours. Then the faster machine takes x-1 hours to complete the same task working alone.

Their combined rate in terms of x is

\frac{1}{x}    +  \frac{1}{x - 1}

This should be equal to 20/9 hours.

\frac{1}{x}  +  \frac{1}{x - 1}  =  \frac{9}{20}

Multiply through by;

20x(x - 1) \times \frac{1}{x}  +20x(x - 1) \times   \frac{1}{x - 1}  =  20x(x - 1) \times \frac{9}{0}

20(x - 1)  +20x = 9x(x - 1)

20x - 20+20x = 9{x}^{2}  - 9x

9{x}^{2}  - 9x - 20x - 20x + 20= 0

9{x}^{2}  - 49x  + 20= 0

Factor to get:

(9x - 4)(x - 5) = 0

x =  \frac{4}{9}  \: or \: x = 5

It is not feasible for the slower machine to complete the work alone in 4/9 hours if the two will finish in 20/9 hours.

Therefore the slower finish in 5 hours.

8 0
3 years ago
the control programs managing computer hardware and software use the ______ function to control and prioritize tasks performed b
Ira Lisetskai [31]

application management


7 0
3 years ago
Other questions:
  • Combination lock uses three numbers beween 1 and 36 with repetition , how mant combinations are possiable
    6·1 answer
  • What procedures are involved in saving a file for the first time?
    10·2 answers
  • You have three users who travel to four branch offices often and need to log on to the RODCs at these offices. The branch office
    12·1 answer
  • The program processes the command line arguments. The arguments indicate which signals to catch:________. A. The program emits a
    10·1 answer
  • The _________ unit, within the CPU, interprets software instructions and literally tells the other hardware devices what to do,
    5·1 answer
  • How does technology help teach twenty-first century skills?
    5·1 answer
  • E-mail messages, instant messages (IMs), or text messages sent and/or received within an organization a. are not included on a r
    9·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • 1. Give the binary equivalents for the numbers 15, 24, 102?
    5·1 answer
  • and assuming main memory is initially unloaded, show the page faulting behavior using the following page replacement policies. h
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!