answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga55 [171]
2 years ago
9

In cell q9 enter a formula using the countif function and structured references to count the number of staff members who have pa

rticipated in [leadership training]

Computers and Technology
1 answer:
bogdanovich [222]2 years ago
4 0
Uses of count function 1.0 COUNTA(range) - when COUNTA() is used, it counts the number of entries on the particular range defined. As long as the cell on the range specified is not emptye.g. Formula is COUNTA(A2:A13), The result would be 12. We have 12 non empty entries on the range
2.0 COUNTIF() - counts the entries on the specified range which satisfies the given conditione.g. Formula is COUNTIF(A2:A13,"Staff"), the result of this is '4'. Where it is specified to count cells with text "Staff" Note : "" (double quotes), denotes that the entry inside is text. 

Find attached Sample

You might be interested in
You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step sho
vagabundo [1.1K]

Answer:

The answer is "check the worksheet is not read only"

Explanation:

The read only mode is used for read the file data, and it doesn't allows the user to update the file, and for updating the worksheet we should check iut does not open in the read-only mode.

If it is open, then we close it and for close we goto the office button and click on the tools option after that goto general setting, in this there is a check box for turn off the read-only mode.

 

8 0
2 years ago
Suppose a linked list of 20 nodes. The middle node has a data –250. Write the pseudocode to replace the middle node of the linke
dexar [7]

Answer:

The middle node has a data –250. ... Write The Pseudocode To Replace The Middle Node Of The Linked List With ... Assume That The List's Head Pointer Is Called Head_ptr And The Data For The New Node Is Called Entry ... Assume that the list's head pointer is called head_ptr and the data for the new node is called entry ...

Explanation:

4 0
2 years ago
Read 2 more answers
An encryption system works by shifting the binary value for a letter one place to the left. "A" then becomes: 1 1 0 0 0 0 1 0 Th
Vika [28.1K]

Answer:

The hexadecimal equivalent of the encrypted A is C2

Explanation:

Given

Encrypted binary digit of A = 11000010

Required

Hexadecimal equivalent of the encrypted binary digit.

We start by grouping 11000010 in 4 bits

This is as follows;

1100 0010

The we write down the hexadecimal equivalent of each groupings

1100 is equivalent to 12 in hexadecimal

So, 1100 = 12 = C

0010 is represented by 2 in hexadecimal

So, 0010 = 2

Writing this result together; this gives

1100 0010 = C2

Going through the conversion process;

A is first converted to binary digits by shifting a point to the left

A => 11000010

11000010 is then converted to hexadecimal

11000010 = C2

Conclusively, the hexadecimal equivalent of the encrypted A is C2

8 0
2 years ago
Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system,
goldfiish [28.3K]

The service model that Kaira’s company is using is Saas

Explanation

Kaira’s company is using Software as a Service to access their new calendaring system that has been hosted by a 3rd party vendor over the web. It is the work of the SaaS to host specific applications and to deliver these applications to customers over the cloud. With SaaS, Kaira’s company does not need to install their calendaring software on their PCs. Every useful thing they want from their calendaring system can easily be accessed over the internet. All the company will need are personalized accounts with usernames and passwords for their employees to access.

The other different types of Cloud Computing services include;

  • PaaS: A set of tools and services designed to make coding and deploying those applications quick and efficient.
  • IaaS: hardware and software that powers it all – servers, storage, networks, and operating systems.

Learn more:

What is cloud computing?

brainly.com/question/2662575

Explain the three basic types of Cloud computing

brainly.com/question/12967175

#LearnwithBrainly

3 0
2 years ago
Scenario 1: Richman Investments provides high-end smartphones to several employees. The value of each smartphone is $500, and ap
vfiekz [6]

Answer:

a). SLE =$37.5

b). ARO =75

c). ALE = $2,812.5

Explanation:

a).Single loss Expectancy (SLE) is starting point in determining the single loss of an asset that will occur and calculated this;

SLE = asset value * exposure factor.

Asset value =$500,

Exposure factor is simply the percentage of asset lost.

In this case out of 1000 phones, 75 were damaged or loss.

In percentage;

75 ÷ 1000 =0.075, 0.075×100=7.5%(exposure factor).

Therefore,

SLE = $500×7.5%= $37.5.

b). ARO - Annual Rate of Occurrence is the number of times a threat on a single asset is expected to occur in one year.

In the case the damage or loss occured in 75 devices in one year.

c). ALE - Annualized loss Expectancy is the product of SLE and ARO.

Therefore;

ALE = $37.5 × 75 = $2,812.5.

3 0
2 years ago
Other questions:
  • The most direct way for Jonathan to gain on-the-job experience and earn money while attending school is to apply for:
    5·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • Program documentation _____. Group of answer choices describes the inputs, outputs, and processing logic for all program modules
    6·1 answer
  • For any element in keysList with a value greater than 60, print the corresponding value in itemsList, followed by a semicolon (n
    14·2 answers
  • Jennifer has written a short story for children. What should be her last step before she submits the story for publication?
    11·1 answer
  • The elements of an integer-valued array can be initialized so that a[i] == i in a recursive fashion as follows: An array of size
    10·1 answer
  • Consider the following two code segments, which are both intended to determine the longest of the three strings "pea", "pear", a
    7·1 answer
  • As a twist on the Hello World exercise, you are going to be the end user of the Hello class. This class is designed to greet the
    9·1 answer
  • A collection of technologies that allow publishing of search results in a format suitable for syndication and aggregation. It is
    5·1 answer
  • Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binar
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!