1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mamont248 [21]
3 years ago
6

Your boss in the human resources department asks you to write a function that calculates the length of time that employees have

been with the firm, using the DATEDIF function. Assume that C2 contains the hire date for a given employee and that cell $AE$2 contains the cut-off date against which to compare the hire date to determine length of service.For a separate service recognition program,you need to calculate the length of service in complete years.What is the correct formula?
A) =DATEDIF(C2, $AE$2, "yr")
B) =DATEDIF($AE$2, C2, "year")
C) =DATEDIF($AE$2, C2, "yr")
D) =DATEDIF(C2, $AE$2, "y")
Computers and Technology
1 answer:
Tems11 [23]3 years ago
4 0

Answer:

Option D is correct i.e., =DATEDIF(C2, $AE$2, "y").

Explanation:

The user's supervisor well into the following department tells him to compose the feature which measures the amount that times staff has served in their company utilizing the DATEDIF feature. Consider whether C2 includes the hiring dates for that staff and then that cell $AE$2 includes the cut-off point for whom to evaluate the hiring time with the duration of the service.

So, therefore the following option is correct according to the given scenario.

You might be interested in
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
Write a simple hello world program in python 3
IRINA_888 [86]

Answer:

print("hello world")

Explanation:

a hello world program is simply a program that prints out hello world.

for this you would need to remember to have the same number of brackets on each side and to write print. Also remember when printing to include speech marks.

6 0
3 years ago
Read 2 more answers
With which game is the Taito Corporation associated?
gregori [183]
It is a japanese video game publisher known for publishing space invaders

4 0
3 years ago
Write a loop that reads positive integers from console input, printing out those values that are even, separating them with spac
zvonat [6]

Hello, since you did not specify a programming language, I wrote this algorithm in C++. Good luck!

<h2>Code:</h2>

#include <iostream>

#include <vector>

std::vector<int> v;

int main(int argc, char* argv[]) {

   while(1) {

   int temp;

   std::cout << "\nEnter a number: ";std::cin>>temp;

   

   if(temp<0) {

       std::cout << "\nEven number(s) is/are:\n---------------------\n";

       for(int i=0;i<v.size();i++) {

           if(v.at(i)%2==0) std::cout << v[i] << " ";

           else continue;

       }

       std::cout << std::endl;

       break;

   }else {

       v.push_back(temp);

   }

}

   return 0;

}

4 0
2 years ago
Recall that through either photographic or computer technology, researchers can make a composite (or "averaged") face out of any
kow [346]

Answer:

People prefer composite faces.

Explanation:

If we take some face's picture, and we make it digital, we could make a composite or averaged face, and when we compare composite faces with originals pictures, people prefer the composite faces because there was symmetry in those faces.

For example:

There was a research where a digitalized student faces men and women, researchers make a composite face for every original, people prefer composite face against the original face.

4 0
4 years ago
Other questions:
  • Which of the following is a disadvantage of using a personality assessment to determine who is well suited for a work position?
    7·2 answers
  • Based on the type of document you want to create, you must first select the page
    15·2 answers
  • How will you convert a decimal fraction into its hexadecimal form by a process of repeated division and repeated multiplication?
    13·1 answer
  • The most important network device is a ____.
    5·1 answer
  • You accidentally moved your task bar from the bottom of the screen to the left side. You would like to
    14·2 answers
  • Please help due today please help me!!!!!
    15·1 answer
  • When can you message on brainly? My account says I have to answer more questions first.
    6·1 answer
  • C++
    11·2 answers
  • What type of computer is used in ATM?
    11·2 answers
  • The number of binary digits required to count 10010 is called _________​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!