1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
3 years ago
8

Please help me plss! PLS​

Computers and Technology
2 answers:
konstantin123 [22]3 years ago
4 0

Answer:

1.  Formula is A2 : A9 = COUNT( A2: A9 ) = 8

2. Formula is SUM( A2: A9 ) = 36

3. Formula is B2 : B9 = COUNT( B2: B9) = 8

4. Formula is  MAX( C2: C9) = 5

5. Formula is MIN( C4: C8) = 3

6. Formula is SUM( C5 - C6) = 0

7. Formula is AVERAGE( C2: C9) = 4

Explanation: Have a nice day! ✌️

lukranit [14]3 years ago
3 0

Explanation:

OKAY, you got your asnswer.. sorry I could not help.

You might be interested in
NEED HELP WILL MARK BRAINLIEST AND 100 POINTS FOR ANSWER Which LIKE operator would match a single character?
marin [14]

Answer:

1st choice

Explanation:

3 0
3 years ago
Read 2 more answers
A network technician is designing a network for a small company. The network technician needs to implement an email server and w
777dan777 [17]

Answer:

(B) Implementing a DMZ segment for the servers

Explanation:

DMZ is the short form for Demilitarized Zone. It is the temporary storage between an internal or private LAN and the public Internet. The main purpose of the DMZ is to give additional layer of security to a company's LAN (Local Area Network).

Once there are services to be provided to users on the public Internet, such services should be added to the DMZ. A few services that are worth implementing a DMZ segment for are;

i. Email servers

ii. Web servers

iii. Proxy servers

iv. FTP servers

5 0
3 years ago
Explain the principle of a Kimball as a data input device<br>​
g100num [7]

Answer:

k

Explanation:

bc i need points

7 0
3 years ago
Read 2 more answers
Please help me!! 10 Points are waiting!!
prisoha [69]

Google

https://google.com

Google has a large index of keywords and where those words can be found. Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

3 0
3 years ago
What will be the value of x after the following code is executed? int x = 10; do { x *= 20; } while (x &lt; 5); A. 10 B. 200 C.
dezoksy [38]

Answer:

Option B is the correct answer.

Explanation:

  • In the above code, the loop will execute only one time because the loop condition is false and it is the Do-While loop and the property of the Do-while loop is to execute on a single time if the loop condition is false.
  • Then the statement "x*=20;" will execute one and gives the result 200 for x variable because this statement means "x=x*20".
  • SO the 200 is the answer for the X variable which is described above and it is stated from option B. Hence it is the correct option while the other is not because--
  1. Option A states that the value is 10 but the value is 200.
  2. Option C states that this is an infinite loop but the loop is executed one time.
  3. Option D states that the loop will not be executed but the loop is executed one time
6 0
3 years ago
Read 2 more answers
Other questions:
  • What is the process of designing green buildings called
    9·2 answers
  • Measuring design attributes is helpful for comparingalternative designs and for predicting:
    11·1 answer
  • A type of backlight technology most commonly used in modern laptop devices is called____________.
    9·1 answer
  • What is the most common password on the internet?
    11·2 answers
  • A printer would be considered _____. Select 2 options. 1 an input device 2 an output device 3 hardware 4 software 5 storage
    10·1 answer
  • What are 3 software programs for mobile computing?
    10·1 answer
  • Describe what impact your personal vision could have your community or on society​
    6·1 answer
  • Consider the key success factors of B2C. Is it only IT? What is most important?​
    8·1 answer
  • Explain the risks to privacy from collecting and storing personal data on computer systems and the programmer’s role to safeguar
    11·1 answer
  • Parameters and return make
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!