answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnZ [28]
2 years ago
13

Suppose that cells B1 through B100 of an Excel spreadsheet contain the quantity of units ordered on each of 100 different days.

The Excel function that would count the number of cells that contain quantities of at least 50 is a. =COUNTIF(B1:B100,">=50") b. =COUNTIF(B1:B100,>=50) c. =COUNTIF(B1:B100,>50) d. =COUNTIF(B1:B100,">50")
Computers and Technology
1 answer:
11111nata11111 [884]2 years ago
7 0

Answer:

The "a" Option is correct.

Explanation:

The "COUNTIF" function counts every cell that, given a condition (value), suits into it. As you want to know the number of cells that contain a value of at least 50, the condition must be properly written to get the correct answer. Unless it is a cell value (e.g. B3), the condition must always be written with quotes (""). So, the options b and c are automatically discarded.

The d option appears to be correct, but it's not. If the condition is written ">50", the function will count every cell with a value above 50. But we're searching values at least (including) 50. So the correct answer is the a option.

You might be interested in
What are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where woul
hjlf

Answer:

  • The difference between a policy, a standard and a practice is as follow:
  1. Policy: It can be defined as the written instructions that describe proper behavior.
  2. Standard: It can be defined as the detailed statement of what must be done to comply with policy.
  3. Practice: It can be defined as the examples of actions that would comply with policy.
  • The three types of security policies are:
  • Enterprise Information Sec. Policy (EISP) : High level policy that sets the strategic direction, scope, and tone for the organization's security efforts. Use: It is used to support the mission, vision and direction of the organization and sets the strategic direction, scope and tone for all security efforts
  • Issue Specific Sec. Policy (ISSP) : An organizational policy that provides detailed, targeted guidance to instruct all members of the organization in the use of a resource, such as one of its processes or technologies. Use: It is used to support routine operations and instructs employees on the proper use of these technologies and processes
  • System Specific Sec. Policy (SysSP): Organizational policies that often function as standards or procedures to be used wen configuring or maintaining systems. SysSPs can be separated into two general groups-managerial guidance and technical specifications- but may be written as a single unified document. Use: It is used as a standard when configuring or maintaining systems.
  • ISSP policy would be needed to guide the use of the web, email and use of personal use of office equipment.

3 0
1 year ago
based on the transcript, what did broadcasting the story through the medium of radio allow welles to do?
tamaranim1 [39]

Answer:

It was Halloween morning, in 1938, Orson Welles opened his eyes just to discover himself as the most trending person in the USA. Just the past night, Welles together with his Mercury Theatre performed the radio adaption of the Wars of the Worlds, written by H.G. Wells. He transformed around 40 years old novel into the false news edition which broadcasted the news of Martian attack on New Jersey.

Explanation:

It was Halloween morning, in 1938, Orson Welles opened his eyes just to discover himself as the most trending person in the USA. Just the past night, Welles together with his Mercury Theater performed the radio adaption of the Wars of the Worlds, written by H.G. Wells. He transformed around 40 years old novel into the false news edition which broadcasted the news of Martian attack on New Jersey. Just previously it was Halloween night, and hence, this was expected. And various listeners of the show were shocked, and they made a lot of crazy calls to the nearby Police Stations, as well as the newspaper publication houses. The radio stations tried to convince various journalists that the radio episode was able to cause hysteria throughout the USA. And by the very next dawn, the front column of each new newspaper from coast to coast together with the headlines related to the huge panic inspired allegedly by the CBS broadcast.

8 0
2 years ago
Select the correct answer. Marie uses a browser to visit a blog. How is the blog uniquely identified? A. web page B. website C.
damaskus [11]

Answer:

I belive the answer is E

Explanation:

8 0
1 year ago
How can you check an orthographic drawing to be sure there are no missing lines
user100 [1]
With an magnify glass
4 0
2 years ago
Write a program that asks the user to input an integer that is a perfect square. A perfect square is an integer that is equal to
BlackZzzverrR [31]

Answer:

// program in python

# import math library

import math

#read input from user

num=int(input("enter an integer:"))

while True:

#find square root on input

   s_root=math.sqrt(num)

#find remainder of root

   r=s_root%1

#if remainder if 0 then perfect square

   if r==0:

       print("square root of the number is:",s_root)

       break

   else:

#if number is not perfect square then ask again

       num=int(input("input is not perfect square !!enter an integer again:"))

Explanation:

Read an integer from user.Find the square root of the input number and then find  the remainder of square root by modulo 1.If the remainder is 0 then number is perfect square otherwise ask user to enter an integer again until user enter a perfect square  number.

Output:

enter an integer:12                                                                                                        

input is not perfect square !!enter an integer again:16                                                                    

square root of the number is: 4.0    

3 0
1 year ago
Other questions:
  • Elaine is upset with her group members because she wanted to lead the group but is not allowed to. She found that other group me
    9·2 answers
  • Isabel is creating a wireframe. She has drawn a layout for the home page along with outlining the navigation elements. She now w
    15·2 answers
  • Assume that the reference variable r refers to a serializable object. Write code that serializes the object to the file ObjectDa
    8·1 answer
  • Explain what might happen if two stations are accidentally assigned the same hardware address?
    15·1 answer
  • Given an int variable k, an int array incompletes that has been declared and initialized, an int variable studentID that has bee
    10·1 answer
  • A student who used a regression model that included indicator variables was upset when receiving only the following output on th
    10·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • Sara is using her personal laptop (which is password protected) at a "hotspot" at a local cafe with wifi access. She is in the m
    7·1 answer
  • Universal Containers (UC) uses a custom object called Vendor. The Vendor custom object has a Master-Detail relationship with the
    10·1 answer
  • If the object instance is created in a user program, then the object instance can access both the public and private members of
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!