1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
3

Enter a formula in cell C2 to calculate next year's salary increase by multiplying the previous year's salary times the Cost of

Living Adjustment (cell name COLA). Use the value of cell B2 times the cell named COLA. Font Size
Computers and Technology
1 answer:
hram777 [196]3 years ago
6 0

Answer:

= B2*(1 + COLA/100)

Explanation:

Given

Cell B2 and reference cell COLA

When Performing calculations in spreadsheet application such as Microsoft Office Excel, you start with the equality sign (=).

Also to calculate the increment in salary using the previous salary requires the following formula;

Old Salary + Old Salary * Increment ---- Factorize

Old Salary ( 1 + Increment)

Here, B2 represents the cell for previous or old salary

While COLA/100 represent the percentage increment.

So, enter the following in cell C2

= B2*(1 + COLA/100)

You might be interested in
Which Tab provides the command to add a hyperlink to a document?
Natali [406]

Answer:

I love it is your responsibility is accepted the second one was for the database reply to your account we should wear the same same Dp xd I have tow bar is the only one hour u

7 0
3 years ago
Read 2 more answers
Write chracteristics of all 5 generation of computer​
jeka94

Answer:

First generation — 1940–1956

-used vacuum tubes

ENIAC, UNIVAC I, IBM 650, IBM 701 etc.

mainframes taking up entire rooms

punched cards I/O

electrostatic and mercury delay line memory, beginning use of core

Second generation — 1956-1963

-used discrete transistors

IBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.

first appearance of minicomputer (PDP-8)

punched cards I/O and line printers (mainframe), TTY (minicomputers)

core memory, magnetic tape for mass storage

Third generation — 1964-1971

-used integrated circuits

IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.

mostly same I/O and memory as second generation

Fourth generation — 1971-present

-use microprocessors

PDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.

transition from minicomputers to personal computers

video terminals used for I/O, specialty computer printers developed

fewer mainframes

semiconductor memory replaces core memory

hard drives and optical drives replace magnetic tape for mass storage, followed by solid-state drives (SSD)

Fifth generation — (current research)

-artificial intelligence and quantum computing

3 0
3 years ago
Read 2 more answers
In which of the following mouse operations do you move the mouse until the pointer is positioned on the item of choice?
wolverine [178]
It's a. You have to move to the item thus pointing ;D
8 0
3 years ago
You have one address, 196.172.128.0 and you want to subnet that address. You want 10 subnets. 1. What class is this address
Korvikt [17]

Answer:

This address is by default a class c network

Explanation:

This IP address in this question is a class c network because it has 196 as its first octet. A class c network is one which has its first octet to be between 192 and 223. the class c network begins with a 110 binary.  If ip is between 192 to 223 it belongs to this class. These first 3 octets are the representation of the network number in the address. Class c's were made to support small networks initially.

8 0
3 years ago
How should technology be used?
Alisiya [41]

Make Sure You Use The Right Technology.

Use Incorporate Automation Tools.

Manage Passwords Effectively.

Only Use Technology Where You Need Help The Most.

Use Chrome Extensions.

Organize Your Time With A Calendar App.

Take Advantage Of Free Applications.

Hope it helps!

6 0
3 years ago
Read 2 more answers
Other questions:
  • A security administrator is implementing a SIEM and needs to ensure events can be compared against each other based on when the
    11·1 answer
  • Read the description of Mike’s work, and identify his profession. Mike’s job is to record sounds in a studio. He studies a video
    14·2 answers
  • An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel i
    12·1 answer
  • In general, what are reasons that someone would choose to use lossy compression? Write a brief response below including at least
    10·1 answer
  • How many 16-byte cache blocks are needed to store all 64-bit matrix elements being referenced using matlab's matrix storage?
    15·1 answer
  • after clicking the start button on your computer screen desktop what option would you then select to examine system components y
    15·1 answer
  • PLEASE I NEED HELP PLEASE PLEASE<br> Which function prompts the user to enter information?
    9·1 answer
  • The the concept of plug-and-play is demonstrated by which of the following scenarios
    14·2 answers
  • OMG 2 TIMES ;DDDDDDDDDDDDDDDDD​
    14·1 answer
  • What is the best way to share a document that contains many image or audio files.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!