1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Burka [1]
2 years ago
9

9. Lael wants to determine several totals and averages for active students. In cell Q8, enter a formula using the COUNTIF functi

on and structured references to count the number of students who have been elected to offices in student organizations.
Computers and Technology
1 answer:
Marianna [84]2 years ago
5 0

Answer:

6376hduejxjueh7ejd hbcu ene7

You might be interested in
Difference between server and a client computer
maw [93]

Answer:

A server stores data for a client computer to access and use, and pretty self eplanitory for a client computer

Explanation:

5 0
3 years ago
Identify an internal user who uses product lifecycle management (plm) software and its data.
Andrej [43]

<u> Quality assurance manager</u> is an internal user who uses product lifecycle management (plm) software and its data.

<h3>What is quality assurance manager?</h3>

The quality assurance manager is accountable for delivering optimum quality of a company's benefits or goods. In addition to maintaining constant quality, they help to ensure keeping with laws, regulations, and environmental standards, recommending improvements where required.

<h3>What is the qualification of a Quality Assurance Manager?</h3>

Quality Assurance Manager Requirements:

Bachelor's degree or associate's with knowledge in the field. Technical proficiency must be able to use computers and generate reports. Capacity to analyze data and create and review processes. Excellent communication skills.

To learn more about quality assurance manager, refer

brainly.com/question/15855298

#SPJ4

Complete question is,

a. Packaging supplier

b. Contract manufacturer

c. Manufacturer's design partner

d. Quality assurance manager

3 0
2 years ago
Which port security violation mode does not generate messages or increment the violations counter?
Zanzabum

The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

<h3>What is  offence?</h3>

A deviation from a code of conduct or law is referred to as a violation. When driving a car, going over the posted speed limit is a regular legal violation. Invading someone else's privacy could include reading their journal. failure to uphold a duty or right; breaching the law.

The two types of violations are states and acts. A transgression is a violation of the rules that is less serious than a foul and frequently involves technicalities of the game. A disrespectful or vulgar act: profanation.

Hence, The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

To learn more about violation, refer to:

brainly.com/question/1274113

#SPJ4

4 0
2 years ago
Illustrate why Sally's slide meets or does not meet professional expectations?
givi [52]

The correct answer to this open question is the following.

Unfortunately, you did not provide any context or background about the situation of Sally and the problem with her slides. We do not know it, just you.

However, trying to be of help, we can comment on the following general terms.

When someone does not meet professional expectations, this means that this individual did not prepare her presentation, lacked technical skills, did not included proper sources, or missed the proper visual aids to make the presentation more attractive and dynamic.

What Sally can improve about her slides is the following.

She can design a better structure for the presentation to have more congruence.

Sally has to clearly establish the goal or goals for her presentation.

She has to add many visuals instead of plain text. This way she can better capture the interest of her audience.

If she can use more vivid colors instead of pale or dark ones, that would be best.

No paragraphs unless necessary. She better uses bullet points.

Take care of the tone of her voice. During her practice, she can record her vice to check how it sounds.

5 0
3 years ago
Define types of hacker ?plz help me with this question​
denis-greek [22]

Answer:

the types of hacker attacks and techniques. White Hat Hackers. Black Hat Hackers. Gray Hat Hackers. Script Kiddies.

Explanation:

i don't know if this can help you

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the final step used when designing an algorithm?
    14·1 answer
  • Anchor hyperlink to position the cursor to the section called sisters? i need a code pls
    15·1 answer
  • What would you use to compare two date ranges in a report?
    9·1 answer
  • Write a function flush that takes as input a list of five cards, tests whether it is a flush (Note: straight flush is not a flus
    11·1 answer
  • Need help developing code!!
    9·1 answer
  • What video game has made the most money as of 2016?
    15·2 answers
  • Pick one of the following scenarios and
    6·1 answer
  • Will mark Brainliest!! What is the best memory to use on a computer? Why?
    9·1 answer
  • Does analogue conversation take place in source as transmitter?
    5·2 answers
  • What is the purpose of the GETPIVOTDATA function?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!