1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
13

14. Emelia is very concerned about safety and has conducted a study to determine how many bike helmets were replaced at each loc

ation last year. She wants to include the survey results in this spreadsheet. Switch to the Helmets Per Location worksheet. Open the Support_SC_EX16_5a_2019HelmetSurvey.xlsx workbook, and then switch back to Helmets Per Location worksheet. Link the data to the Helmets Per Location worksheet as described below: a. In cell C3 of the Helmets Per Location worksheet, create a formula without using a function that contains a relative reference to cell D2 of the 2019 Damaged Helmet Survey worksheet in the Support_SC_EX16_5a_2019HelmetSurvey.xlsx workbook. b. In the Helmets Per Location worksheet, copy the formula in cell C3 to the range C4:C5 without copying the formatting. c. Close the Support_SC_EX16_5a_2019HelmetSurvey.xlsx workbook and switch back to the Helmets Per Location worksheet.

Computers and Technology
2 answers:
Scrat [10]3 years ago
6 0

Answer:

How can I do this formula please.

Explanation:

Emelia is very concerned about safety and has conducted a study to determine how many bike helmets were replaced at each location last year. She wants to include the survey results in this spreadsheet. Switch to the Helmets Per Location worksheet. Open the Support_SC_EX16_5a_2019HelmetSurvey.xlsx workbook, and then switch back to Helmets Per Location worksheet. Link the data to the Helmets Per Location worksheet as described below: a. In cell C3 of the Helmets Per Location worksheet, create a formula without using a function that contains a relative reference to cell D2 of the 2019 Damaged Helmet Survey worksheet in the Support_SC_EX16_5a_2019HelmetSurvey.xlsx workbook. b. In the Helmets Per Location worksheet, copy the formula in cell C3 to the range C4:C5 without copying the formatting. c. Close the Support_SC_EX16_5a_2019HelmetSurvey.xlsx workbook and switch back to the Helmets Per Location worksheet.

damaskus [11]3 years ago
5 0

Answer:

Explanation:

Known Variables A = max Daily Rentals

X = Damaged helmets %

lets find the formula to calculate Helmets per location :taking 1st row as an example.

412 = B - (B*13/100)

412 = (100B-13B)/100

412*100 = 87B

B= 412*100/87

Hence, the generic formula becomes : B= A*100/(100-X)

Applying the same formula for each row and then using ROUND function of excel to round off the digits

=ROUND(number,digits) where number is the number you would like to round off and the digits is the number of decimal digits for it to round off. Since we want natural numbers in our example, we will be using digits as 0.

Explanation:

See attached pictures also.

You might be interested in
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Ali rolled a ball down a hill. This graph shows the kinetic and potential energy of the moving ball.
denis23 [38]
Ghhsususuhwbababahaha
8 0
1 year ago
Can someone please explain binary addition to me? i have a test tomorrow yikes
umka2103 [35]

Answer:

its easy

Explanation:

there are are 5 main rules

in binary there are 2 number 0 and 1

0 + 0 = 0

0 + 1 = 1

1+0=1

1+1=0 carry 1

e . g

1 1 1

1 0 1 0 1 0

+ 1 1 0 0 1 0

-------------------------

1 1 1 1 1 0 0

*in bold are the ones that you need to carry.

in decimal there are 10 possible numbers 0- 9

when you do 1 + 9 it becomes 10, this can be done easily, however if you do 1 + 9 in a table like above, you will get 0 for the first column and you will carry 1 to the next column .

in binary is the same idea but using on 2 numbers 1 and 0

e.g

1

1

+ 9

----------

1 0

*in bold are the ones that you need to carry.

hope it helps and good luck in your exam.

3 0
2 years ago
Which type of systems development is characterized by significantly speeding up the design phase and the generation of informati
nydimaria [60]

Answer:

Joint Application Development (JAD)

Explanation:

Joint Application Development is a method of application development that  lay emphasis on the up-front aspect of the application development cycle whereby steady communication between the designers and the intended users of the application under development by coming together in collaborative workshop styled discussions known as JAD sessions involving the mediators, facilitator, observers, end users, experts, and developers. As such with JAD process application development result in fewer errors high quality and is completed in lesser time.

3 0
2 years ago
You can set a ________, which is automatically displayed in a field unless the user enters something different.
Wittaler [7]

Answer:

Place holder

Explanation:

In computer programming, placeholder is a word, character or series of characters that is used to take up the space until the time when the space is actually needed. It is widely used in the sign up or login forms for web and mobile applications. For example, First Name, Last Name etc.

A programmer might have an idea that he will require this number of characters or values but he don't knows what the input will be, that’s why he uses the place holder.

Hope it helps!

6 0
3 years ago
Other questions:
  • Which of the following tasks is least effective at preventing a computer virus?
    14·2 answers
  • You should use html elements instead of server controls when
    11·1 answer
  • User-system interaction is?
    11·1 answer
  • Java: Literal representing the true value ? In java, what is the literal that represents a true value ?
    6·1 answer
  • What are the TWO methods of copying and pasting on the AutoCAD Clipboard function?
    7·1 answer
  • Que es un programa de ordenador?
    10·1 answer
  • A static class method can be accessed without referring to any objects of the class. True False
    7·1 answer
  • Assuming dataFile is an ofstream object associated with a disk file named payroll.dat, which of the following statements would w
    9·1 answer
  • What when can you expect technology to be effective?
    12·1 answer
  • What features should you present when demonstrating 2023 murano’s confident cornering?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!