1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kramer
3 years ago
14

A banker would like to present a spreadsheet as part of a presentation to potential clients. The spreadsheet makes use of severa

l advanced spreadsheet features. One of these features shows clients how much interest they can earn by opening a new savings account with the bank. Savings are shown by month and by year. Which feature will prevent the annual interest earnings total from duplicating monthly interest earnings totals? Nested IF statement subtotal function conditional formatting cell protection
Computers and Technology
1 answer:
Alekssandra [29.7K]3 years ago
6 0

Answer:

subtotal function

Explanation:

The Microsoft Excel SUBTOTAL returns the subtotal of the numbers in the columns in a list or database, and it can be applied horizontally as well as vertically. And the SUBTOTAL function happens to be the built-in function in Excel which is categorized as the Math function or the Trigger function. And like a worksheet function, it can be inserted as a part of the formula inside a cell of a worksheet. Select the columns in a row, or rows in a column, and move to the Data tab in the ribbon. From there,  select the SUBTOTAL, and the function you would like to use, and press ok. And this means here the correct option is the subtotal function.

You might be interested in
You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits m
Tomtit [17]

Answer:

Option D) 5

Explanation:

4 subnet bits is 240 mask which provides 2^{4}, i.e., 16 subnets and provides 14 hosts for each.

In order to achieve the target and provide correct subnet mask, 5 subnet bits are required to be borrowed from the host of a classful network address as then the addition of one more subnet bit would result in 248 mask which in turn gives 5 subnet bits which results in 2^{5}, i.e., 32 subnets and 3 host with 6 host per subnet.

7 0
3 years ago
To discover how many cells in a range contain values that meet a single criterion, use the ___ function
alexandr402 [8]

Answer:

COUNTIF

Explanation:

the Countif function counts the number of cells in range that meets a given criteria.

6 0
3 years ago
Guess The Song: <br> What Popping Brand New Whip Just Hopped In, I Got options
Georgia [21]

Answer:

its called whats poppin lol

Explanation:

:)

7 0
3 years ago
Select the correct answer.
Dvinal [7]

Answer:

A

Explanation:

because when you make a presentation so you are already use technology

4 0
3 years ago
A _____ is a network that uses multiple access points to link a series of devices that speak to each other to form a network con
morpeh [17]
I think the answer is WAN (wide area network)
6 0
3 years ago
Other questions:
  • Discuss the differences between permanent internal memory and volatile internal memory.
    14·1 answer
  • A router is a device that addresses a packet on a network to the next router along the line. Under which layer of the OSI model
    5·1 answer
  • This type of technology does not come with a keyboard or mouse for input
    11·2 answers
  • A network administrator wants to logically separate web servers on the network. Which of the following network device will need
    10·2 answers
  • Each webpage is assigned a(n) ______, an address that identifies the location of the page on the Internet.
    6·1 answer
  • Describe the 3 different types of authentication
    6·2 answers
  • The correct ordering of the seven layers from "top" to "bottom" is
    11·1 answer
  • Brainliest to right answer.
    10·1 answer
  • Lily obtained data from five trails 50 kcal 72 kcal 12 kcal and 50 kcal which best decribes her data
    11·1 answer
  • Question 4 A data analyst wants to include a line of code directly in their .rmd file in order to explain their process more cle
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!