1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
9

ANSWER ASAP GIVING BRAINIEST FIVE STAR AND HEART!

Computers and Technology
2 answers:
sergejj [24]3 years ago
4 0

Answer:

A formula is a statement written by the user to be calculated and the function is a piece of code designed to calculate specfic values and is used inside formulas

Explanation:

Bingel [31]3 years ago
3 0

Answer:A formula is an expression which calculates the value of a cell. Functions are predefined formulas and are already available in Excel.

For example, cell A3 below contains a formula which adds the value of cell A2 to the value of cell A1.

Explanation:

You might be interested in
Use the table on the right to convert from decimal to hexadecimal.
leva [86]

Answer:

what is the question and answers?

3 0
2 years ago
Read 2 more answers
Explain how any simple substitution cipher that involves a permutation of the alphabet can be thought of as a special case of th
Kaylis [27]

A simple substitution cipher takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

<h3>What is the Hill cipher?</h3>

In 1929, the Hill cipher was invented by Lester S. Hill and it can be described as a poly-graphic substitution cipher that is typically based on linear algebra and it avails a cryptographer an ability to simultaneously operate on more than three (3) symbols.

In Cryptography, the simple substitution cipher is usually viewed as a function which takes each plaintext letter (alphabet) and assigns it to a ciphertext letter. Thus, it takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

Read more on Hill cipher here: brainly.com/question/13155546

#SPJ1

6 0
1 year ago
A computer program is tested by 5 independent tests. If there is an error, these tests will discover it with probabilities 0.1,
Svetllana [295]

Answer:

0.8488

Explanation:

Let E =error found by test 1

Let F=error found by test 2

Let G=error found by test 3

Let H=error found by test 4

Let I= error found by test 5

Given P(E)=0.1, P(F)=0.2, P(G)=0.3, P (H)= 0.4, P (I)=0.5

therefore P(notE)=0.9, P(notF)=0.8, P(notG)=0.7, P(not H)=0.6, P (notI)=0.5

Tests are independent P(not E & not F &not G & not H & not I=P(notE)*P(notF)*P(notG)*P (notH)*P (not I) =0.9*0.8*0.7*0.6*0.5 =0.1512

P(found by at least one test)= 1- P(not found by any test)=1-P(not E& not F & not G & not H & not I ) = 1-0.1512 = 0.8488

5 0
3 years ago
How do i answer a question that was asked on Brainly?
stealth61 [152]

Answer:

if you have the app go to the little answer column, click on that and the. you can answer questions hope this helps!

3 0
3 years ago
Read 2 more answers
In PyCharm, write a program that prompts the user for their name and age. Your program should then tell the user the year they w
Neporo4naja [7]

Answer:

def main():

   name = input("What is your name? ")

   if not name == "" or "":

       age = int(input("What is your age? "))

       print("Hello " + name + "! You were born in " + str(2021 - age))

main()

Explanation:

Self explanatory

5 0
3 years ago
Other questions:
  • Several coworkers in the sales department received an email claiming to be from you. Each message was personally addressed and c
    11·1 answer
  • A compound document contains _______ from different applications.
    12·2 answers
  • Write a method so that the main() code below can be replaced by the simpler code that calls method mphandminutestomiles(). origi
    14·2 answers
  • Do you watch markiplier?
    13·2 answers
  • Which of the following is NOT a design choice when using the ER model?
    5·1 answer
  • Select the correct answer from each drop-down menu. Look at Marta's email signature and fill in the missing elements. Marta D'Ab
    14·2 answers
  • Although a tablet can connect to a cellular network, it cannot be used as a
    11·2 answers
  • Why should information technology NOT be taught in school?​
    14·1 answer
  • What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and
    9·1 answer
  • What dose a compress pictures command do ?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!