1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
just olya [345]
2 years ago
7

In cell K8, create a formula using the SUM function that calculates the total of range D17:D20 and subtracts it from the value i

n J8
Computers and Technology
1 answer:
S_A_V [24]2 years ago
6 0

Answer:

=(J8 - SUM(D17:D20))

Explanation:

Required

Add D17 to D20

Subtract the result from J8

Save the result in K8

To do this, we make use of a nested bracket.

The innermost bracket is to add up D17 To D20 using the sum function.

i.e. SUM(D17:D20)

While the outermost bracket will subtract the calculated sum from J8.

=(J8 - SUM(D17:D20))

You might be interested in
Consider the following program segment. ifstream inFile; //Line 1 int x, y; //Line 2 ... //Line3 inFile >> x >> y; /
AnnyKZ [126]

Answer:

inFile.open("progdata.dat");

Explanation:

5 0
2 years ago
True or False: Cracking a Vigenère cipher with brute force takes longer than a Caesar cipher, but it is still a reliable method
iragen [17]

Answer:

False

Explanation:

The Vigenere cipher is an encryption method that uses a series of interwoven Ceaser ciphers and a keyword to encrypt text. The difference between this cipher and the Ceaser cipher is the tabular interwoven Ceaser cipher and the keyword.

Multiple keywords can be used in the Vigenere cipher. The use of this keyword makes the brute-force decipher algorithm unreliable for decoding text encrypted with it.

7 0
2 years ago
Susan uploads her newly created files on the web server using FTP. What should she ensure while uploading to prevent other users
galben [10]

Answer:

A, check file permissions

Explanation:

if you don't set proper file permissions people can modify the contents of what you have uploaded to the FTP server

7 0
3 years ago
Read 2 more answers
How long after activating comcast set top box before getting channels??
rjkz [21]
It usually takes about 45 minutes.
6 0
3 years ago
Write a C++ nested for loop code to print out the following onthe screen1 2 3 4 5 67 8 91 2 3 4 5 67 81 2 3 4 5 671 2 3 4 561 2
Mekhanik [1.2K]

Answer:

#include<iostream>

using namespace std;

//main function

int main(){

   

  //nested for loop

   for(int i=9;i>=1;i--){

       for(int j=1;j<=i;j++){

          cout<<j<<" ";  //display

       }

   }

   return 0;

}

Explanation:

Include the library iostream for using the input/output instruction in the c++ programming.

Create the main function and takes nested for loop. Nested for loop means, for loop inside the another for loop.

For every value of outside for loop, inside for loop execute.

we make outer for loop in decreasing format, means it start from 9 and goes to 1 and inside for loop make in increasing format, means loop start from 1 and it goes to that value which is provided by the outer loop.

and print the output for every cycle.

Lets dry run the code:

the outer loop starts from 9 and it checks the condition 9>=1, condition true. then the program moves to the inner loop which starts from 1 and goes to the 9.

first, it also checks the condition 1 <= 9, condition true and prints the number from 1 to 9.

then,  i is reduced by 1. it means i become 8.

then, the above process continues from 1 to 8 and so on...

the loop process will terminate if the outer loop terminate.

Finally, we get the output.

6 0
2 years ago
Other questions:
  • 14. Emelia is very concerned about safety and has conducted a study to determine how many bike helmets were replaced at each loc
    13·2 answers
  • Your brother is starting 9th grade next year and is thinking about going to college. What step would you recommend he take?
    14·1 answer
  • Need Help ASAP!
    14·2 answers
  • What are the benefits of organizing your thoughts before you begin your speech
    14·1 answer
  • In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet
    8·1 answer
  • Write the Python code to implement each step of the following algorithm. Your code should use descriptive variable names and per
    7·1 answer
  • Which form of currency is not backed by gold today
    14·1 answer
  • Write a java program that would request user name, id number, and state the time the user has reported at work.​
    12·1 answer
  • Why do you think that so many of these sources have similar names?
    9·1 answer
  • What can i say back to my IT school lady?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!