answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
2 years ago
12

Give the logical function for the following: If cell B7 equals 12, check contents of cell B10. If cell B10 is 10, then the value

of the function in the string is YES; if not, it is a blank space. If cell B7 does not equal 12, then the value of the function is 7
Computers and Technology
1 answer:
ASHA 777 [7]2 years ago
5 0

Answer:

=IF( B7 = 12, ( IF( B10 = 10,"YES", "")), 7) and PRESS ENTER

Explanation:

the above logical if function checks the following

-IF cell B7 is 12, if true, check the value of cell B10, IF cell B10 contains 10 the function should produce YES as output to whatever cell selected, IF B10 is not 10 output of the function should be an empty string, IF B7 is not equal to 12 the the output of the function should be 7.

You might be interested in
Darius needs to include contact information in an email that he is sending to a colleague . Which option should he choose from t
melamori03 [73]

The question is incomplete:

Darius needs to include contact information in an email that he is sending to a colleague . Which option should he choose from the ribbon?

-Attach File

-Attach Item

-Attach Policy

-Attach Signature

Answer:

-Attach Signature

Explanation:

-Attach file is an option that allows you to include any type of file that you need to send in the email.

-Attach Item  is an option that allows you to include an element from your email like a message in your inbox to the current one you are writing.

-Attach Policy is not an option.

-Attach Signature is an option that allows you to include a previously created signature with the contact information at the end of the message.

According to this, the answer is that the option that Darius should choose from the ribbon is attach signature because he needs to include contact information.

4 0
1 year ago
Which of the following are examples of algorithms? (Select all that apply, if any do.)
Travka [436]

Answer:

A. The mathematical formula for finding the area of a circle.

D. Instructions for setting up a new DVD player

E. A series of steps that moves a "lighting bot" around to turns on lights.

Explanation:

Algorithm is a systematic procedure (or process) that produces the answer to a question or the solution of a problem in a finite number of steps.

Option A is an algorithm. The mathematical formula for finding the area of a circle gives a solution to a problem. The problem is finding area of a circle and the formula gives the step by step procedure finding the area of a circle.

Option B is not an algorithm. Option B just provide a list of your favourite animals and it doesn't answer a question we know about.

Option C is not an algorithm. A problem statement is still a problem with no solution whereas algorithm provides solution

Option D is an algorithm. It provides the step by step procedures for setting up a new DVD player

Option E is an algorithm. It provides a series of steps that moves a lighting bot around to turns on lights, so it provides a solution.

4 0
2 years ago
Read 2 more answers
LAB: Miles to track laps. (PLEASE CODE IN PYTHON)
bekas [8.4K]

Answer:

The program in python is as follows:

def miles_to_laps(user_miles):

     return (user_miles/0.25)

mile = float(input("Number of Miles: "))

print("Number of laps: ",end="")

print('{:.2f}'.format(miles_to_laps(mile)))

Explanation:

The first line defines the function miles_to_lap

def miles_to_laps(user_miles):

This line returns the equivalent number of laps

     return (user_miles/0.25)

The main method starts here

This line prompts user for input

mile = float(input("Number of Miles: "))

This line prints the string "Number of laps", without the quotes

print("Number of laps: ",end="")

This prints the equivalent number of laps to two decimal places

print('{:.2f}'.format(miles_to_laps(mile)))

3 0
2 years ago
Read 2 more answers
Write a method that accepts a String object as an argument and displays its contents backward. For instance, if the string argum
Nata [24]

Answer:

// importing the necessary libraries

import java.util.Scanner;

public class BackwardString {

public static void main(String[] args) {

String input;

// Scanner object to read string from user input

Scanner scanner = new Scanner(System.in);

System.out.print("Enter String here : ");

input=scanner.next();

// calling backward method to reverse passed string

backward(input);

// closing Scanner object

scanner.close();

}

// Method to Reverse the input string

private static void backward(String source) {

int i, len = source.length();

StringBuilder dest = new StringBuilder(len);

for (i = (len - 1); i >= 0; i--){

dest.append(source.charAt(i));

}

System.out.println("Reversed String : "+dest);

}

}

Explanation:

// importing the necessary libraries

import java.util.Scanner;

public class BackwardString {

public static void main(String[] args) {

String input;

// Scanner object to read string from user input

Scanner scanner = new Scanner(System.in);

System.out.print("Enter String here : ");

input=scanner.next();

// calling backward method to reverse passed string

backward(input);

// closing Scanner object

scanner.close();

}

// Method to Reverse the input string

private static void backward(String source) {

int i, len = source.length();

StringBuilder dest = new StringBuilder(len);

for (i = (len - 1); i >= 0; i--){

dest.append(source.charAt(i));

}

System.out.println("Reversed String : "+dest);

}

}

The program above accepts a String object as an argument and displays its contents backward.

It reverses the any string inputed while producing the output.

6 0
1 year ago
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
svetoff [14.1K]

Answer:

Session hijacking

Explanation:

Session hijacking : Session hijacking is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.

5 0
1 year ago
Other questions:
  • When creating a table in the relational database design from an entity in the extended e-r model, the attributes of the entity b
    13·1 answer
  • Which computer applications can Mr. Crowell use to make the classroom learning more stimulating and interesting? Mr. Crowell has
    9·2 answers
  • python Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value i
    7·1 answer
  • FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this i
    5·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • A function defined beginning with void SetNegativesToZeros(int userValues[], ... should modify userValues such that any negative
    12·1 answer
  • A laptop gets replaced if there's a hardware issue. Which stage of the hardware lifecycle does this scenario belong to?
    5·1 answer
  • What term best describes the grammatical rules for writing proper code? paths syntax hyperlinks declarations
    7·2 answers
  • Write any 5 activities that help to remove bad events from the society?​
    13·2 answers
  • Which is the correct notation to specify the following inheritance?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!