1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex17521 [72]
3 years ago
9

14. If B3=10 and D5=8, what would the following function return? IF(B3>D5, "Closed", D5-B3) *

Computers and Technology
1 answer:
kompoz [17]3 years ago
7 0
IF function has three parts
IF (condition_to_check , return_if_true , return_if_false)

IF function first checks condition. If it is true it returns first result. Otherwise it returns second result.

Condition to check:
B3>D5
After inserting numbers we get:
10>8
This is correct so the first result will be returned.
The given IF function returns "Closed".
You might be interested in
Disadvantages of Batch<br>operation system​
jok3333 [9.3K]

Answer:

Disadvantages of Batch Operating System:

  1. The computer operators should be well known with batch systems.
  2. Batch systems are hard to debug.
  3. It is sometime costly.
  4. The other jobs will have to wait for an unknown time if any job fails.
8 0
3 years ago
Most people prefer to pay health insurance premiums rather than pay out of pocket for medical expenses because
oksano4ka [1.4K]
They may not have enough money for the bill at the time, and its easier to pay for insurance for unseen medical procedures.
7 0
3 years ago
Read 2 more answers
Which of these is a historic real-world simulation game?
harkovskaia [24]

Answer:

B. Archery

Explanation:

the art, practice, or skill of shooting with bow and arrow

7 0
2 years ago
Linda is a core member of a project. She estimates the cost of the project, creates project requirements, and notes risks. What
lord [1]

Explanation:

no linda is the core member not rhe project

4 0
3 years ago
In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
Natasha_Volkova [10]

Answer:

Caesar cipher

Explanation:

In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.

There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.

Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.

Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.

4 0
3 years ago
Other questions:
  • Raeball was a lovin doll. And she spoke her mind as she stood tall. She made you special and loved. You're missed by so many. An
    10·2 answers
  • Why it’s important to keep the standard internet protocol TCP/IP?
    11·1 answer
  • What are the two types of digital water marking?
    5·1 answer
  • Write a script that will read from a file x and y data points in thefollowing format:
    9·1 answer
  • • Open your Netbeans IDE and answer the following question
    5·1 answer
  • What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative
    12·1 answer
  • The 60-watt light bulb has a 400 hour life expectency how much will it cost to operate during its time
    14·1 answer
  • Write a program which asks the user for their name and age. The program should then print a sentence.
    14·1 answer
  • Agent Phil Coulson developed this program to register Avengers in S.H.I.E.L.D's database using cutting-edge programming language
    15·1 answer
  • 5. Compare the telephone network and the internet. What are the similarities? What are the differences?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!