1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
10

Which function can you use to abbreviate the lengthy expression, A1+A2+A3+A3...+A19+A20?  MAX COUNT SUM ROUND

Computers and Technology
2 answers:
Naddika [18.5K]3 years ago
6 0
Which function can you use to abbreviate the lengthy expression, A1+A2+A3+A3...+A19+A20? SUM
bija089 [108]3 years ago
4 0

Answer:

SUM

Explanation:

The lengthy expression, A1 + A2 + A3 + A4 + ... + A19 + A20 can be abbreviated with the function SUM. In this case, the expression is: SUM(A1:A20). As can be seen with this example, this function returns the sum of the range of cells.

You might be interested in
List the step in turning on a computer
kondaur [170]
On the CPU first and then then the power button if there is password access then u have to type the password
this Much only
hope it helps :)
7 0
3 years ago
security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
daser333 [38]

Organization must notify the DPA and individuals

<h3>What was the typical weakness that outside attackers exploited?</h3>

One frequent flaw in network security that some attackers have learnt to take advantage of is the propensity of some web browsers, like Safari, to launch "safe" or "trusted" scripts automatically. Threat detection is the process of scrutinizing a security ecosystem from top to bottom to find any malicious behavior that could jeopardize the network. If a threat is identified, mitigating measures must be taken to effectively neutralize it before it can take advantage of any existing vulnerabilities. It's critical to often scan because security professionals and hackers frequently discover new vulnerabilities, like Log4Shell. Therefore, scanning for and identifying security vulnerabilities is the initial step in the vulnerability remedy procedure.

To learn more about outside attackers refer to

brainly.com/question/17329931

#SPJ4

3 0
1 year ago
A system that provides monthly production figures for a manager at manufacturing facility is considered a(n) __________. a. ente
Stolb23 [73]

Answer:

Management information system (MIS)

Explanation:

Most manufacturing companies are organized into levels, with each level having different kinds of information systems. The four major types of systems placed on each organizational level include:

Transactional Processing System (TPS) – Business systems at this level serve at the lowest point of the operational level in an organization. It performs routine transactions like sales entry and payroll.

Management Information Systems – MIS transforms TPS inventory and production data into compressed formats and presented in detailed reports produced as per the agreed schedules to the managers. These reports can be served on a daily, hourly, or monthly basis.

Decision-Support Systems (DSS) – Managers at this level are majorly responsible for making unique and rapidly changing decisions

ESS – It is the strategic level in an organization. Top senior managers use this level to make non-routine decisions that require insight and a lot of judgment.

4 0
3 years ago
How it/computing has impacted on engineering? <br><br> I need seven answers please help !
Marina CMI [18]

Answer:

1. they are now able to make,design and test designs created

2.with the use of a computer , work is done at a very fast rate

3. with a computer in the field of engineering, mistakes don't occur frequently.

5 0
3 years ago
write the structure of an email message ques.2 what do you mean by search engine? write its component .ques. 3 what are the adva
loris [4]

Answer:

1.....There is a standard structure for emails. Email contents are primarily classified as two, the header and the body. We are going to see the contents come under the two subparts. The email header gives us common details about the message such as the unique identity of the message.

Explanation:

2......a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.

its components are ....

A search engine normally consists of four components e.g. search interface, crawler (also known as a spider or bot),indexer, and database.

3.....Advantages Of eLearning

It is a very efficient way of delivering courses online. Due to its convenience and flexibility, the resources are available from anywhere and at any time. Everyone, who are part time students or are working full time, can take advantage of web-based learning.

hope this will help you ..

please like and mark as brilliant.

4 0
3 years ago
Other questions:
  • HELP ASAP!!!!!!!!! ITS A UNIT TEST: WILL MARK AS BRAINLIEST&gt;
    13·1 answer
  • What are words with the root gest?
    15·1 answer
  • Which is the last step in conducting a URL search?
    5·2 answers
  • Create a style rule for the page body that sets the width to 95% of the browser window ranging from 640 pixels up to 960 pixels.
    11·1 answer
  • A _____ refers to a product or service, such as a technical report, a training session, a piece of hardware, or a segment of sof
    12·2 answers
  • Jason is working on a project that requires him to manage a huge amount of data. The spreadsheet he is working on has data relat
    15·1 answer
  • Choose the word that matches each definition. : processed facts, how the output is used for making decisions : action performed
    12·2 answers
  • Greg wants to check the amount of requests his website receives. What test can he use?
    6·1 answer
  • Calcula l'energia (Kwh) consumida per una màquina de 30 CV que funciona durant 2 hores.
    12·1 answer
  • Is a dot matrix printer an impact or non-impact printer
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!