The formula =average(B1:B2) displays the value____(see the picture down)

The Formula =average(B1:B2) Displays The Value____(see The Picture Down)

Answers

Answer 1

9514 1404 393

Answer:

  (a)  10

Explanation:

The formula displays the average of the values 8 and 12. That average is ...

  (8+12)/2 = 10

The Formula =average(B1:B2) Displays The Value____(see The Picture Down)

Related Questions

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions

Answers

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

can someone's answer this​

Answers

Answer:

See explanation

Explanation:

Required

The surface area of each shape

Triangle

[tex]Area = \frac{1}{2}bh[/tex]

[tex]b\to base; h \to height[/tex]

So:

[tex]Area = \frac{1}{2} * 23 * 21[/tex]

[tex]Area = 241.5m^2[/tex]

Square

[tex]Area = l^2[/tex]

[tex]l \to length[/tex]

So:

[tex]Area = 10^2[/tex]

[tex]Area = 100m^2[/tex]

Rhombus

[tex]Area =a^2\sin(\theta)[/tex]

[tex]a \to side\ length[/tex]

[tex]\theta \to any\ interior\ angle[/tex] (not given)

So:

[tex]Area =18^2\sin(\theta)[/tex]

[tex]Area =324\sin(\theta)[/tex]

Trapezium

[tex]Area = \frac{1}{2}(a + b)*h[/tex]

[tex]a,b \to parallel\ sides; h \to height[/tex]

So:

[tex]Area = \frac{1}{2}(18 + 23)*21[/tex]

[tex]Area = \frac{1}{2}*41*21[/tex]

[tex]Area = 430.5m^2[/tex]

Circle

[tex]Area = \frac{\pi d^2}{4}[/tex]

[tex]d \to diameter[/tex]

So:

[tex]Area = \frac{3.14 * 5^2}{4}[/tex]

[tex]Area = \frac{3.14 * 25}{4}[/tex]

[tex]Area = \frac{78.5}{4}[/tex]

[tex]Area = 19.625m^2[/tex]

Select the correct answer from each drop-down menu.
Complete the sentence about uses of spreadsheets.

Two of the most common uses of spreadsheets are to _____ data and _____ data.

First blank
1. Create new
2. Search for
3. Store available

Second blank
1.Sort
2. Classify
3. Download

Answers

I think it’s 1, 2 and if im wrong im sorry

Two of the most common uses of spreadsheets are to create new data and classify data. Thus, the correct options for this question are A and B respectively.

What are the uses of Spreadsheet?

The uses of spreadsheets are as follows:

It is used to collect and store data that is systematically organized.It authorizes users in order to make calculations with the stored data.Spreadsheets are also used to make charts and graphs.It actively supports users in data sifting and cleanup.

According to the context of this question, apart from the above top uses of spreadsheets, there are other various uses that can be delivered by this platform to the user that make their professional work more efficient, organized, and attractive.

Therefore, the most common uses of spreadsheets are to create new data and classify data. Thus, the correct options for this question are A and B respectively.

To learn more about Spreadsheets, refer to the link:

https://brainly.com/question/26919847

#SPJ2

cuales son los signos de exel

Answers

Answer

explanation

Operador de comparaciónSignificadoEjemplo< (signo menor que)Menor que=A1<B1>= (signo mayor o igual que)Mayor o igual que=A1>=B1<= (signo menor o igual que)Menor o igual que=A1<=B1<> (signo distinto de)No es igual a=A1<>B1

Answer:

¿Qué quieres decir?

Explanation:

brain of the computer system is called​

Answers

Answer:

central processing unit in short form CPU :)

Answer:

The Central Processing Unit(CPU)

Explanation:

The CPU is the brain of a computer, containing all the circuitry needed to process input, store data, and output results.

Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.

it crashed a lot
it could only run one application at a time
it didn't use a pointing device
it provided a shell for MS-DOS

Answers

Answer:

it providrd a shell for MS-DOS

Explanation:

It basically was a shell to make MS-DOS different. MS-DOS was still the underlying operating system.

We can draw crescent using ?

Answers

Answer:

I think it's B

hope this helps

have a good day :)

Explanation:

…….. and ……...are called binary digits. (Computer Science)

Answers

Answer:

Explanation:

0 and 1 are called binary digits.

here is your answer..

Jack regularly uses a wireless connection to access various networks as he travels around the world running his fashion line. Jack is able to access these Wi-Fi networks by using what?

Answers

Answer:

A Virtual Private Network, VPN connection

Explanation:

Virtual Private Network, VPN, is connection from a device to the internet which is encrypted and protected whenever such networks is established including on public networks. When a VPN is used third parties will not easily track or eavesdrop on the network or traffic data from the connection

different he launc.
in function are available with MS-Excel
Many​

Answers

functions are available with MS-Excel..

1.count and sum

2.cell references

3.data and Time

4.text

5.lookup and reference

6.finanical

7.round

8.array formula

Input the time in hours. Calculate and print the time in minutes and seconds. [I hr = 60 minutes]

Answers

Answer:

The program in Python is as follows:

hrs = float(input("Hours: "))

mins = 60 * hrs

print("Minutes: ",mins)

Explanation:

This prompts the user for hours

hrs = float(input("Hours: "))

This converts to minutes

mins = 60 * hrs

This prints the minutes equivalent

print("Minutes: ",mins)

in python write a code to find power (2 & -2)

Answers

Explanation:

b) (c) ... Want to see the step-by-step answer ? ... Q: Write a python program with comments

Which of the following ports is not considered to be exclusively a video port? Group of answer choices HDMI DVI USB DisplayPort Flag question: Question 22 Question 221 pts To speed up the display of graphics, a(n) ________ is integrated into most video cards. Group of answer choices GPU VGA ALU SSD

Answers

Answer:

The answer is "USB and GPU".

Explanation:

USB ports are not considered as a video ports only. It could also connect USB devices & transfer digital information via USB cables. It could also power gadgets who need it via the cord.

A GPU is integrated into certain video cards to help speed up the overall viewing of visuals. It was initially a specialized CPU designed to accelerate graphic rendition. GPUs can write down several pieces of information, making it useful for artificial intelligence, photo editing, and online games.

When you assign a value of one data type to a variable of another data type, Visual Basic attempts to perform ________ type conversion. Group of answer choices

Answers

Answer: implicit

Explanation:

When a value of one data type is assigned to a variable of another data type, then Visual Basic attempts to perform an implicit type conversion.

Implicit type conversion, simply refers to when one data type is converted automatically by Python to another data type. It should be noted that no user involvement is needed.

Consider the LIBRARY relational database schema description provided below which is used to keep track of books, borrowers, and book loans. The relations are: • BOOK (BookID, Title, PublisherName) • BOOK_AUTHORS (BookID, AuthorName) • PUBLISHER (Name, Address, Phone) • BOOK_COPIES (BookID, BranchID, NumberOfCopies) • BOOK_LOANS (BookID, BranchID, CardNumber, DateOut, DueDate) • LIBRARY_BRANCH (BranchID, BranchName, Address) • BORROWER (CardNumber, Name, Address, Phone) 1. Consider the schema given above: (a) (5 points) Give a primary key for each relation. Are there any relations for which there is an alternate candidate key that you have not chosen as the primary key? If yes, mention the relations, candidate keys and the reason (if any) for your choice of the primary key. (b) (10 points) State all referential integrity constraints that should hold on these relations.

Answers

Answer:

1) Yes, Publisher relation should have a publisherID primary key.

2) NOT NULL and UNIQUE for the BookID, BranchID, CardNumber and name of the borrower in the Book, Book_Copies, Library_branch, and Borrower relations respectively. The DueDate field of the book_loan relation must be a time constraint. The BookID of the Book relation must be serial number for automatic addition and update of bookid across the database.

Explanation:

The Publisher relation should have primary key publisherID which should replace the publisherName in the Book relation to easily make a join query and attain a third-level database model.

Which activity is the best example of a negative habit that may result from
heavy computer and Internet usage?
A. Playing web-based games instead using social media
B. Shopping online in order to find a gift for a friend
c. Using apps for driving directions instead of using a paper map
O D. Avoiding local friends in order to play online games
SUBMIT

Answers

Answer:

D

Explanation:

Any of these is an example, but the most drastic would be D, Avoiding local friends in order to play online games

Suppose you are developing a data visualization application DataViz which calls some functions from a statistics library class SuperStats. You recently heard about another statistics library UberStats with supposedly significantly better performance than SuperStats. Explain how you would redesign the DataViz class using the Adapter pattern so that DataViz can be configured at runtime to use either SuperStats or UberStats. Does your design use dependency inversion and/or dependency injection? Explain

Answers

Answer:

By using dependency injection, create the adapter to adapt both the DataViz and the UberStats interface as expected.

Explanation:

Adapters are used in Objected-oriented programming to run or convert the output of one class object to another. The DataViz class currently uses the SuperStats class as an adaptee to get and output statistical results.

Write a new code from the scratch is tedious, so, the UberStats class dependencies are injected in the adapter and the DataViz and UberStats class functionalities can be experimented with.

pls help it’s on a test!! no links :) you can zoom in if hard to read

Answers

Answer:

the last one

Explanation:

the domain specifies exactly what file is requested the path specifies where the browsers request should be sent

Running the Disk Cleanup utility is a quick way to ________. Group of answer choices defrag your hard drive remove spyware programs clear out temporary Internet files uninstall unwanted apps

Answers

Answer:

Clear out any garbage file on the drive

Explanation:

Running the Disk Cleanup utility is a quick way to clear out temporary Internet files. Therefore option C is correct.

Running the Disk Cleanup utility is a quick and efficient way to clear out temporary files and unnecessary data from your computer's hard drive.

These files can accumulate over time from web browsing, software installations, and system updates, occupying valuable disk space and potentially slowing down your system.

The Disk Cleanup tool identifies and deletes temporary internet files, cached data, downloaded program files, and other unnecessary files, freeing up space and improving system performance.

However, it is important to note that Disk Cleanup does not defragment your hard drive (A), remove spyware programs (B), or uninstall unwanted apps (D), as these tasks require different tools or procedures.

Therefore option C is correct.

Know more about Disk Cleanup:

https://brainly.com/question/31937611

#SPJ6

In which of the following phases of filmmaking would a production team be focused on the process of casting?
(Select all that apply).
pre-production

post-production

development

distribution

Answers

Explanation:

There are five phases of film production and they include development, pre-production, production, post-production and distribution.

Answer:

pre-production

Explanation:

edg2021

Once the film concept has been developed, the film company transitions to the production phases: pre-production, production, and post-production. In pre-production, the technical details are worked out, a schedule is set, and the resources to produce the film are assembled. This includes casting the film, filling the technical positions, and scheduling the production. The actual filming takes place during the production phase, followed by a post-production phase in which the footage is edited and the final film emerges.

COMP
Mention six characteristics of modern computers.
i.
ii.
iv.​

Answers

Answer:

speed

storage capacity

reliability

accuracy

diligence

multitasking

introduction of waste management​

Answers

Answer:

Waste management (or waste disposal) includes the activities and actions required to manage waste from its inception to its final disposal. ... Waste management deals with all types of waste, including industrial, biological and household. In some cases, waste can pose a threat to human health.

please answer this question​

Answers

Answer:

The answer for this question is Kry+Ptography

what will happen to the tools and equipment, if it is not store propely?​

Answers

This question doesn’t make any sense I guess it will rust

The control unit and arithmetic logic unit are part of which hardware component?
O A. Blu-ray disc
B.
ROM
O C.
monitor
D.
CPU
O E
RAM

Answers

Answer:

The control unit and arithmetic logic unit are part of which hardware component IS CPU

CPU IS THE ANSWER

Explanation:

Answer: The answer to your question is CPU

Explanation:

How can data be calculated?

Answers

Answer:

Data can be calculated by solving an equation

Explanation:

what is the difference btween a microcontroller a mini computer?

Answers

Answer:

The latter is also present in both Microcontrollers and Microcomputers; both of which are essentially the same but built for different purposes: the microcontroller does basic logic and requires little time and components to do so, whilst the microcomputer does heavier computation and requires a longer time and more power to do so.

Answer:

The latter is also present in both Microcontrollers and Microcomputers; both of which are essentially the same but built for different purposes: the microcontroller does basic logic and requires little time and components to do so, whilst the microcomputer does heavier computation and requires a longer time and more power to do so.

_______ and _______ are the logical statement.

Answers

True and false are the logical statements

A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?

Answers

Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”

When using the “rule of thirds,” where should focal points be placed?

Answers

Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.

Have a nice day!

Other Questions
given the number line which inequality has the solution shown below0.4x + 7 < 10.5x + 6 > 30.3x + 8 < 30.2x + 5 > 2 Henry says he can write an 8 in each box to make both equations true. Is he correct? How successful was the U.S. in gaining support for U.S. involvement in wars? An apartment cost $870 per month to rent. The owner raises the price by 20% and then gives a discount of 8% to returners who sign an 18 month lease. How much less the renters who signed the 18 month lease pay per month to rent the apartment What realization does Aunt Imogen come to by the end of the poem?She understands that her dreams of marriage and family are dead.She regrets that she is an outsider and has not spent more time with her sister and her sister's family.She realizes that her sister's life is not as pleasant as it seems.She appreciates her ability to be independent and free from responsibility. Choose the correct word based on the context.Que?Por qu?De dnde?Adnde?Quin(es)Dnde?Cmo?Cundo?Cul(es)?Cuntos(as)?Con quin?Cunto(a)?1. _________ haces t en tiempo libre?-Yo toco la guitarra, y a vecesvoy al cine con mis amigos.2. _________ van Uds.a las montaftas?-Maftana.3. _________ bolgrafos tienes?-Tengo cuatro bol igrafos.4. _________ es l?-s el mi amigo Ricardo.5. _________ eres t?-Soy de Los Baos.6. _________ vas t?-Voy a la piscina. An airline promotion to business travelers is based on the assumption that no more than two-thirds of business travelers use a laptop computer on overnight business trips. a. State the hypotheses that can be used to test the assumption. H 0: p Select H a: p Select b. What is the sample proportion from an American Express-sponsored survey that found 359 of 535 business travelers use a laptop computer on overnight business trips (to 4 decimals)? Simplify the expression. Write your answer as a power.(3.8^3)^4The simplified expression is 49 66 + 49 34 = 49 ( ____+ _____) Jane and her friend Maria both invest in the stock market. The probability that Jane makes money in a given week is .6. The probability that Jane and Maria both make money in a given week is .48. What is the probability that Maria makes money in a given week if Jane also makes money in that same week Please help me thanks :)) Two similar trapezoids have areas 225 and 400. If the height of the smaller trapezoid is 12, find the height of the larger trapezoid. How do steroids cause death Four coins are tossed in succession. What is the probability of getting all heads?1/41/21/16 You deposit $200 each year for 10 years into a sinking fund that pays 6% interest compounded annually what is the future value of your fund Simplify 5-32 a.-2 b.-4 c.2 d.16 HELP PLEASE URGENTTTTTT the M.E = K.E + P.E. If the M.E of the football is 150 J and when it's thrown the K.E is 70 J. What is the P.E of the football? Extend the given sentence by adding a Subordinate clause to the following main clause:He was the kind of man who read enormous old books. Identify the sentence that builds a mood of anxiety.