answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
2 years ago
13

14. Emelia is very concerned about safety and has conducted a study to determine how many bike helmets were replaced at each loc

ation last year. She wants to include the survey results in this spreadsheet. Switch to the Helmets Per Location worksheet. Open the Support_SC_EX16_5a_2019HelmetSurvey.xlsx workbook, and then switch back to Helmets Per Location worksheet. Link the data to the Helmets Per Location worksheet as described below: a. In cell C3 of the Helmets Per Location worksheet, create a formula without using a function that contains a relative reference to cell D2 of the 2019 Damaged Helmet Survey worksheet in the Support_SC_EX16_5a_2019HelmetSurvey.xlsx workbook. b. In the Helmets Per Location worksheet, copy the formula in cell C3 to the range C4:C5 without copying the formatting. c. Close the Support_SC_EX16_5a_2019HelmetSurvey.xlsx workbook and switch back to the Helmets Per Location worksheet.

Computers and Technology
2 answers:
Scrat [10]2 years ago
6 0

Answer:

How can I do this formula please.

Explanation:

Emelia is very concerned about safety and has conducted a study to determine how many bike helmets were replaced at each location last year. She wants to include the survey results in this spreadsheet. Switch to the Helmets Per Location worksheet. Open the Support_SC_EX16_5a_2019HelmetSurvey.xlsx workbook, and then switch back to Helmets Per Location worksheet. Link the data to the Helmets Per Location worksheet as described below: a. In cell C3 of the Helmets Per Location worksheet, create a formula without using a function that contains a relative reference to cell D2 of the 2019 Damaged Helmet Survey worksheet in the Support_SC_EX16_5a_2019HelmetSurvey.xlsx workbook. b. In the Helmets Per Location worksheet, copy the formula in cell C3 to the range C4:C5 without copying the formatting. c. Close the Support_SC_EX16_5a_2019HelmetSurvey.xlsx workbook and switch back to the Helmets Per Location worksheet.

damaskus [11]2 years ago
5 0

Answer:

Explanation:

Known Variables A = max Daily Rentals

X = Damaged helmets %

lets find the formula to calculate Helmets per location :taking 1st row as an example.

412 = B - (B*13/100)

412 = (100B-13B)/100

412*100 = 87B

B= 412*100/87

Hence, the generic formula becomes : B= A*100/(100-X)

Applying the same formula for each row and then using ROUND function of excel to round off the digits

=ROUND(number,digits) where number is the number you would like to round off and the digits is the number of decimal digits for it to round off. Since we want natural numbers in our example, we will be using digits as 0.

Explanation:

See attached pictures also.

You might be interested in
Generating a signature with RSA alone on a long message would be too slow (presumably using cipher block chaining). Suppose we c
boyakko [2]

Answer:

Following are the algorithm to this question:

Explanation:

In the RSA algorithm can be defined as follows:  

In this algorithm, we select two separate prime numbers that are the "P and Q", To protection purposes, both p and q combines are supposed to become dynamically chosen but must be similar in scale but 'unique in length' so render it easier to influence. Its value can be found by the main analysis effectively.  

Computing N = PQ.  

In this, N can be used for key pair, that is public and private together as the unit and the Length was its key length, normally is spoken bits. Measure,

\lambda (N) = \ lcm( \lambda  (P), \lambda (Q)) = \ lcm(P- 1, Q - 1)  where \lambda is the total function of Carmichaels. It is a privately held value. Selecting the integer E to be relatively prime from 1and gcd(E,  \lambda (N) ) = 1; that is E \ \ and  \ \ \lambda (N).  D was its complex number equivalent to E (modulo \lambda (N) ); that is d was its design multiplicative equivalent of E-1.  

It's more evident as a fix for d provided of DE ≡ 1 (modulo \lambda (N) ).E with an automatic warning latitude or little mass of bigging contribute most frequently to 216 + 1 = 65,537 more qualified encrypted data.

In some situations it's was shown that far lower E values (such as 3) are less stable.  

E is eligible as a supporter of the public key.  

D is retained as the personal supporter of its key.  

Its digital signature was its module N and the assistance for the community (or authentication). Its secret key includes that modulus N and coded (or decoding) sponsor D, that must be kept private. P, Q, and \lambda (N) will also be confined as they can be used in measuring D. The Euler totient operates \varphi (N) = (P-1)(Q - 1) however, could even, as mentioned throughout the initial RSA paper, have been used to compute the private exponent D rather than λ(N).

It applies because \varphi (N), which can always be split into  \lambda (N), and thus any D satisfying DE ≡ 1, it can also satisfy (mod  \lambda (N)). It works because \varphi (N), will always be divided by \varphi (N),. That d issue, in this case, measurement provides a result which is larger than necessary (i.e. D >   \lambda (N) ) for time - to - time). Many RSA frameworks assume notation are generated either by methodology, however, some concepts like fips, 186-4, may demand that D<   \lambda (N). if they use a private follower D, rather than by streamlined decoding method mostly based on a china rest theorem. Every sensitive "over-sized" exponential which does not cooperate may always be reduced to a shorter corresponding exponential by modulo  \lambda (N).

As there are common threads (P− 1) and (Q – 1) which are present throughout the N-1 = PQ-1 = (P -1)(Q - 1)+ (P-1) + (Q- 1)), it's also possible, if there are any, for all the common factors (P -1) \ \ \ and \ \ (Q - 1)to become very small, if necessary.  

Indication: Its original writers of RSA articles conduct their main age range by choosing E as a modular D-reverse (module \varphi (N)) multiplying. Because a low value (e.g. 65,537) is beneficial for E to improve the testing purpose, existing RSA implementation, such as PKCS#1, rather use E and compute D.

8 0
1 year ago
The vast amount of data collected from Internet searches, social media posts, customer transactions, military
Brums [2.3K]

Answer:

A. Big Data

Explanation:

It is big data. The internet searches, customer transactions, social media posts, medical tests, weather sensors, military surveillance, and all the data source you are seeing around yourself forms together with the big data. And a big social media company gathers around so many petabytes of data each day. And there are so many such companies, plus all sorts like eLearning sites, etc. And all these together form the big data.

3 0
2 years ago
If a program repeatedly shows separate feature branches rather than a true System Demo, which practice should be reviewed to add
Alenkinab [10]

Answer:

Continuous Integration tool is used to address the issue of separate features branch of program.

Explanation:

Continuous integration process comprise of three main objectives such as improvement, delivery and development of the software. In contentious integration tool all the people  three objective specialist are work together to make program better.

Continuous integration is a platform that is used to detect the problems in a code that need to be corrected. The code is store in the repository of the tool that needs correction. The reviewers review the code in different portions of the code and identify and resolve the problem. There are multiple contributors to correct the code.

8 0
1 year ago
Fiona is drawing polygons on a computer. She wants to map a regular 9-sided polygon back onto itself using a reflection. Which s
Rus_ich [418]
The answer is "<span>B) any perpendicular bisector of one of the sides".
</span>
We can define a line of reflection as the line in which a shape is reflected, or we can say that it is the mirror in which the shape is reflected. The line of reflection is the perpendicular bisector of any pair of corresponding points. If you want to join sets of corresponding points on the object and image, then the line of reflection will slice the lines framed down the middle.
4 0
1 year ago
Read 2 more answers
Which graphics element loads faster when used with text or audio on a web page?
Kobotan [32]

An “iframe” maybe idk what is asking

5 0
1 year ago
Read 2 more answers
Other questions:
  • Jefferson is interested in starting his own business. He plans to borrow money from the local bank in order to finance the busin
    9·2 answers
  • Two technicians are discussing lung protection in the shop. Technician A says that respiratory-protection devices can prevent yo
    5·2 answers
  • Assume that name has been declared suitably for storing names (like "Misha", "Emily" and "Sofia") Write some code that reads a v
    10·1 answer
  • In the Budget Details sheet, if you wish to autofill with the formula, you must use a ______ reference for the LY Spend Total ce
    10·1 answer
  • A restaurant has a case type that allows customer to book the dining room for events. Customers provide basic information includ
    11·1 answer
  • The variable grade can have any real number value from 0 to 100. Ask the user to enter a grade in numerical form. Write an if-el
    9·1 answer
  • Write a loop that continually asks the user what pets the user has, until the user enters "rock", in which case the loop ends. I
    12·1 answer
  • When considering server consolidation, plan on running ___________ vCPUs per core.a. 1 to 2b. 3 to 4c. 4 to 6d. 6 to 8
    7·1 answer
  • Which expansion slot is used by an NVMe compliant device?
    9·1 answer
  • How does Accenture help companies harness the power of data to achieve optimal business outcomes?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!