1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
azamat
3 years ago
15

In cell a10 enter a formula using or to display true if net profit before tax in 2019 (cell b5) are greater than 750000(seven hu

ndred, fifty thousand) or net profit before tax in 2020 (cell c5) are greater than 750000 (seven hundred, fifty thousand). use cell references where appropriate and enter the arguments exactly as described in this question.
Computers and Technology
1 answer:
mina [271]3 years ago
4 0

The OR Excel function is a function that is used to test several conditions in one statement.

The Excel formula to display true based on the conditions in cell A10 is =OR(B5>750000,C5>750000)

From the question, we have:

  • Cell B5 represents the net profit before tax in 2019
  • Cell C5 represents the net profit before tax in 2020

The syntax of the OR logical function is: =OR([conditions])

So, the Excel formula to display true based on the conditions in cell A10 is =OR(B5>750000,C5>750000)

Read more about Excel formulas at:

brainly.com/question/14820723

You might be interested in
Given the Query Data Type, which of the following is incorrectly matched with the corresponding Storage Data Type?
Tamiku [17]

Answer:

<h2>c) Date : Date</h2>

Explanation:

A type of attribute of data is called data type in computer science, data types tells the interpreter how a person wants to use the data. The basic data types are supported by most of the programming languages, the basic data types are Integers, float, characters, strings, point numbers and arrays. The terminology may differ from one language to other.

3 0
3 years ago
Give an efficient algorithm to find all keys in a min heap that are smaller than a provided valueX. The provided valuedoes notha
OlgaM077 [116]

Answer:

Starting from root, recursively traverse the min-heap. Once we find a key with value less than our X, we know that every key in subtree of that key will be also smaller than our X. Otherwise, we should keep traversing.

Explanation:

The complexity of this algorithm will be O(N) where N is the number of keys in our min-heap.

3 0
3 years ago
The NSA could be hiding small snooping programs in, let's just say, a picture of a cute kitten or a fun Android game." So how ca
grin007 [14]
One way could be to check the code of the program.
But of course this might not be possible... Not everyone knows a programming language. And even if you did, you might not know the programming language they used.

Another way is to download a program that monitors your incoming connections and outgoing connections from your computer/android/iphone.

When someone or something connects to your device, the program should alert you. Or when the computer makes a connection to a website/device.
8 0
3 years ago
Which of these jobs would be most appropriate for someone who majors in information systems?
Margaret [11]
-Designing a database for an online retailer
6 0
3 years ago
Read 2 more answers
When you use a text editor to start a new HTML file from an old file, you a. open the old file, add code to it, and save it with
crimeas [40]

Answer:

Option a are the correct answer for the above question.

Explanation:

  • If any user wants to change any old file with any new file holding the new code. Then he needs to---
  1. firstly open the old file
  2. Then change to the new file and
  3. Then save the file with the new name.
  • The above option is stated from the option a. So an answer is an option a while the other is not because:-
  1. With the work of the options b, the new code will not save into the file.
  2. With the work of the options c, the new file also contains the same code as the old file.
5 0
3 years ago
Other questions:
  • If an ips identifies an attack, it can ________.
    15·1 answer
  • Does anyone know the code for codeHS 5.4.7 teenagers?
    8·1 answer
  • How do you represent (decimal) integer 50 in binary
    7·1 answer
  • The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditio
    15·1 answer
  • tls Explain in your own words how, by applying both asymmetric and symmetric encryption, your browser uses TLS to protect the pr
    8·1 answer
  • Convert the following numbers to binary numbers: 5 , 6 , 7 , 8 , 9 .​
    13·2 answers
  • Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is
    14·1 answer
  • Write down the reciprocal of 40​
    12·1 answer
  • What is a digital dashboard, and why are they becoming an increasingly popular tool?
    15·2 answers
  • PLEASE HELP!!!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!