answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ycow [4]
2 years ago
13

Column A contains numbers from rows 1-20. You can use the formula ----?---- to find the value of the largest number divided by t

he total number of values.
Computers and Technology
1 answer:
Lelechka [254]2 years ago
6 0

Using Excel formulas<span>
<span> =LARGE(A1:A20, 1)/COUNT (A1:A20)</span></span>

 Count (Ai:An) Function that allows to count the total number of values in a cells range between Ai and An that contain only numbers.

  Large (Ai:An, k) Function that allows to find the value of the largest number in a cells range between Ai and An, the number k determine the k-th largest value

<span> </span>

You might be interested in
Which of the following are examples of algorithms? (Select all that apply, if any do.)
Travka [436]

Answer:

A. The mathematical formula for finding the area of a circle.

D. Instructions for setting up a new DVD player

E. A series of steps that moves a "lighting bot" around to turns on lights.

Explanation:

Algorithm is a systematic procedure (or process) that produces the answer to a question or the solution of a problem in a finite number of steps.

Option A is an algorithm. The mathematical formula for finding the area of a circle gives a solution to a problem. The problem is finding area of a circle and the formula gives the step by step procedure finding the area of a circle.

Option B is not an algorithm. Option B just provide a list of your favourite animals and it doesn't answer a question we know about.

Option C is not an algorithm. A problem statement is still a problem with no solution whereas algorithm provides solution

Option D is an algorithm. It provides the step by step procedures for setting up a new DVD player

Option E is an algorithm. It provides a series of steps that moves a lighting bot around to turns on lights, so it provides a solution.

4 0
2 years ago
Read 2 more answers
Why is it important to set a strict password policy as part of your security template?
kari74 [83]
So that its well secured and not misused by unauthorized persons
6 0
2 years ago
A record company is using blockchain to manage the ownership of their copyrighted content. The company requires that every time
Fantom [35]

By creating a smart contract to calculate party royalties

8 0
1 year ago
A database should have an identity separate from the applications (computer programs, forms, and reports) that use it. The separ
eduard

The separate identity allows the database definition to be changed without affecting related applications is known as <u>DATA.</u>

<u>Explanation:</u>

Normally nowadays program and database are keeping separately. MySQL server, mongo dB, oracle, sql server extra installed separate followed folder or separate drive in operating system.

So software program just use connectivity technology to add or update or delete information from in the database. Form or report just access the data from database and produce required output.

Normal SQL database will stored as records as rows in tables. Normally database can been access through database application directly to update records such as SQL PLUS, MYSQL workbench etc.

6 0
2 years ago
Henry, a graphic artist, wants to create posters. Which software should Henry use for this purpose?
Ede4ka [16]

Answer:

which is free graphic software or use

Explanation:

3 0
2 years ago
Other questions:
  • An electronics store purchased a CD player at a wholesale price of $60 and then sold it at a 40 percent discount off the origina
    13·1 answer
  • You are attempting to open a file containing a list of integer numbers, each on a separate line, and read them into Python as in
    6·1 answer
  • __________ access control is a form of __________ access control in which users are assigned a matrix of authorizations for part
    8·1 answer
  • Translate the following MIPS code to C. Assume that the variables f, g, h, i, and j are assigned to registers $s0, $s1, $s2, $s3
    8·1 answer
  • Earlier in the day, you created a user account for Brenda Cassini (bcassini). When she tries to log in, she can't. You realize t
    9·2 answers
  • Your project must satisfy the following requirements:
    7·1 answer
  • Darius needs to include contact information in an email that he is sending to a colleague . Which option should he choose from t
    11·1 answer
  • Assign max_sum with the greater of num_a and num_b, PLUS the greater of num_y and num_z. Use just one statement. Hint: Call find
    5·1 answer
  • A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of ti
    6·1 answer
  • In this problem, you will derive the efficiency of a CSMA/CD-like multiple access protocol. In this protocol, time is slotted an
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!