1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex17521 [72]
3 years ago
9

14. If B3=10 and D5=8, what would the following function return? IF(B3>D5, "Closed", D5-B3) *

Computers and Technology
1 answer:
kompoz [17]3 years ago
7 0
IF function has three parts
IF (condition_to_check , return_if_true , return_if_false)

IF function first checks condition. If it is true it returns first result. Otherwise it returns second result.

Condition to check:
B3>D5
After inserting numbers we get:
10>8
This is correct so the first result will be returned.
The given IF function returns "Closed".
You might be interested in
you are a bank loan officer. carter has to come into your office and applied for a loan for a car.you ran his credit report, and
elena-14-01-66 [18.8K]

Answer:

Carter score falls within the range of scores, from 300 to 579, considered Very Poor. Score is significantly below the average credit score.

Explanation:

5 0
3 years ago
(tco 8) the process of granting a user access to an application is called _____.
Scrat [10]

I guess the correct answer is Authentication.

The process of granting a user access to an application is called Authentication.

3 0
2 years ago
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
2 years ago
in java A retail company must file a monthly sales tax report listing the total sales for the month and the amount of state and
qaws [65]

Answer:

  1. import java.util.Scanner;
  2. public class Main {
  3.    public static void main(String[] args) {
  4.        Scanner input = new Scanner(System.in);
  5.        System.out.print("Input total sales of month: ");
  6.        double totalSales = input.nextDouble();
  7.        double stateTax = totalSales * 0.04;
  8.        double countyTax = totalSales * 0.02;
  9.        double totalSalesTax = stateTax + countyTax;
  10.        System.out.println("County Tax: $" + countyTax);
  11.        System.out.println("State Tax: $" + stateTax);
  12.        System.out.println("Total Sales Tax: $" + totalSalesTax);
  13.    }
  14. }

Explanation:

Firstly, create a Scanner object and prompt user to input total sales of month (Line 5-7). Next, apply the appropriate tax rate to calculate the state tax, county tax (Line 9 - 10). Total up the state tax and county tax to get the total sales tax (Line 11).

At last, print the county tax, state tax and the total sales tax (Line 13 - 15).

8 0
2 years ago
True or False
NISA [10]

Answer: The answer would be True

3 0
3 years ago
Other questions:
  • Summarize the five stages of cultural shock
    11·2 answers
  • How many possible mac addresses are there?
    5·1 answer
  • Identify at least three body language messages that project a positive attitude?
    15·1 answer
  • Can someone please give me two (2) thesis statement for this question?
    5·1 answer
  • Check my work a(n) ________ reference is an automatically created variable that holds the address of an object and passes it to
    15·1 answer
  • Write the definition of a function reverse, whose first parameter is an array of integers and whose second parameter is the numb
    15·1 answer
  • What are specific and relevant terms that will help you locate information using an internet search engine?
    10·1 answer
  • What is best for a busy student to do for better results in school?
    10·2 answers
  • How do you make a ringtone on earsketch
    9·1 answer
  • State the difference between a monitor and a television​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!