1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
atroni [7]
3 years ago
5

Help pleaseWho will give the answer I'll mark him/her as brainlist..​

Computers and Technology
1 answer:
kolbaska11 [484]3 years ago
4 0

Answer:

We will be using Average function of Excel Calculation sheet.

Its Syntax in Calc sheet is : =AVERAGE (number1, [number2], ...)

or you can use =Average and then click on the first cell and drag the whole row till end and close the brackets. It will calculate the average of that row.

Once you have applied average function on first row, you can drag this cell down the column and it will replicate the same function for respective rows.

You might be interested in
What's the difference between an exe file and an msi file?
tatiyna

Answer: <u>EXE files are mainly used to indicate that the file is executable</u>

<u>MSI files show that the file is a Windows Installer</u>

<u />

Explanation:

EXE files are mainly used to indicate that the file is executable

MSI files show that the file is a Windows Installer

<u>MSI files are only used with launchers, EXE does not need to be used with launchers </u>

Hope this helped :)

5 0
2 years ago
Describe the steps to play a presentation the way your audience will see it. A)Go to the View tab and select Editing View. B)Go
Sonbull [250]

C) Go to the View tab and select Slide Show.

Explanation:

Steps for Slide Show View to Deliver a Presentation:

  • Go to the Slide Show view from the Task bar at the bottom of the slide window.
  • Use the Slide Show view to deliver your presentation to your audience.
  • Slide Show view occupies the full computer screen.

5 0
3 years ago
Select the processes that help to create a program.
Marina86 [1]

Debugging ..............

4 0
3 years ago
Injection attacks variants can occur whenever one program invokes the services of another program, service, or function and pass
velikii [3]

Answer:

True

Explanation:

In Computer science, It's true that injection attacks variants can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it.

5 0
3 years ago
Which of the following events happened first?
horrorfan [7]

Answer:

D. ARPANET was developed

Explanation:

ARPANET is an acronym for Advanced Research Projects Agency Network and it was established in 1969 by the Advanced Research Projects Agency (ARPA) of the United States Department of Defense.

ARPANET was the first wide area packet switching network for transmitting electronic data and communications between computers on a single network with a distribution functionality. The TCP/IP protocol was first implemented on the Advanced Research Projects Agency Network (ARPANET), as well as some other standard protocols such as the NCP and the 1822 protocol.

The development of ARPANET happened first in the evolution of the internet.

E-mail is an acronym for electronic mail and it was invented by Ray Tomlinson in 1971; World Wide Web was created by Tim Berners-Lee in 1990; Web 2.0 evolved in 1999.

6 0
4 years ago
Other questions:
  • In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as wel
    7·1 answer
  • 6) RAM, 5 main memory<br>which storage conbe used<br>as permanent storage<br>Rom<br>a) R<br>)​
    8·2 answers
  • As it is a good practice that C# broughtback the concept of GOTO statement and Pointer? If your answer isyes then how C# control
    15·1 answer
  • Why am I not getting the activation link for my account?
    11·1 answer
  • To print factorial of any<br>input number <br>QBASIC​
    6·1 answer
  • Which programming paradigm does the programming language JavaScript follow?
    14·1 answer
  • Which font is most suitable for an academic article on a website? Which is most suitable for casual information?
    5·2 answers
  • Plzzz help ya girl out due soon
    13·1 answer
  • Digital security measures include _____. Select 2 options.
    11·2 answers
  • Which practice enables recovery of accidental deletions in data records?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!