1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
3 years ago
11

A teacher uses the spreadsheet below to determine the average quiz score of each student. The teacher inserts this information i

nto column E. In column F, which function can be cut and pasted into different cells to tell the teacher if each student exceeded the satisfactory average?
Computers and Technology
2 answers:
Vinvika [58]3 years ago
6 0

need help!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Troyanec [42]3 years ago
3 0

Answer: The correct answer is the IF Function.

Explanation: The IF function can perform a logical test on data in the spreadsheet and then return one value for a TRUE result, and another for a FALSE result. For example, the teacher can set the formula to print Pass or Fail in column F, based on the data in column E.

You might be interested in
Create a multimedia project that contains the text element and all the contents that you have studied about that element
Marrrta [24]

Answer:

no sé jejejejeje

lslsl

lonsinet

ko

8 0
3 years ago
Netflix uses ________ analytics to suggest which movies we should watch as well as to develop new content that it is confident w
marusya05 [52]

Answer:

"Predictive analytics" is the correct answer to the given question.

Explanation:

Predictive analysis is the analysis of the data. It is a type of data analytics that gives the future results by analyzing the historical data Some of the examples of predictive analytics are Machine Learning. Netflix is using the technique of Predictive analytics.

Netflix provides the services of entertainment. In Netflix, we watch the movies also it developed the new content.

6 0
3 years ago
The spreadsheet below shows a list of fruits with their calorie count, grams of sugar, dietary fiber, and protein. Which set of
dangina [55]

Answer:

Filter Calories by over 100 calories, and sort Sugar in descending order.

Explanation:

4 0
3 years ago
The network of safe houses that assisted runaway enslaved people was known as:.
dedylja [7]

Answer:

The Underground Railroad

Explanation:

4 0
2 years ago
Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti
givi [52]

The term vulnerability describes the issue that Adam discovered.

b. vulnerability

<u>Explanation:</u>

SQL injection attack is an attack in which an external party can execute SQL commands on the database that serves as a back-end for a particular website. The SQL commands can be used to modify the contents of the website, modify the records, delete the records, and retrieve confidential information as well.  

As Adam believes that the code has an issue that allows a SQL injection attack, the term that best describes the issue that he discovered is vulnerability. The website is vulnerable since the code does not have a proper procedure to tackle a situation of SQL injection attack.

7 0
3 years ago
Other questions:
  • By placing the chorale melody in the highest voice and using a simple harmonization, bach made it easier for congregation member
    5·1 answer
  • Which statement accurately describes DTP programs?
    11·1 answer
  • . Some countries lack physical resources, like computers or network connections, making it difficult to keep up with the technol
    8·2 answers
  • I have this assignment due TONIGHT BEFORE 10PM! Please help. 50 points for whoever will help!! Here is the assignment.
    7·1 answer
  • Give me at least five main characteristic of irrigation equipment​
    8·1 answer
  • The cutting tool that has a zig zag edge is called a?
    9·1 answer
  • What is the role of the memory in a computer ​
    11·1 answer
  • Var words = ["apple", "bug","car", "dream", "ear", "food"]
    6·2 answers
  • Lattice-based access controls use a two-dimensional matrix to assign authorizations. What are the two dimensions and what are th
    6·1 answer
  • The classes Person and Airplane shall have the property to print information about themselves on a printer. Draw class and inter
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!