answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnZ [28]
2 years ago
13

Suppose that cells B1 through B100 of an Excel spreadsheet contain the quantity of units ordered on each of 100 different days.

The Excel function that would count the number of cells that contain quantities of at least 50 is a. =COUNTIF(B1:B100,">=50") b. =COUNTIF(B1:B100,>=50) c. =COUNTIF(B1:B100,>50) d. =COUNTIF(B1:B100,">50")
Computers and Technology
1 answer:
11111nata11111 [884]2 years ago
7 0

Answer:

The "a" Option is correct.

Explanation:

The "COUNTIF" function counts every cell that, given a condition (value), suits into it. As you want to know the number of cells that contain a value of at least 50, the condition must be properly written to get the correct answer. Unless it is a cell value (e.g. B3), the condition must always be written with quotes (""). So, the options b and c are automatically discarded.

The d option appears to be correct, but it's not. If the condition is written ">50", the function will count every cell with a value above 50. But we're searching values at least (including) 50. So the correct answer is the a option.

You might be interested in
In the process of retrieving a specific memory from a web of associations a person needs to activate one of the strands that lea
iVinArrow [24]

Answer:

Priming.

Explanation:

The brain is the centre of control for all animals. It coordinates the body system, breathing, beating of the heart, memory, gait, speech, sight etc.

Memory is stored in the brain ( the function of the cerebral cortex in the cerebrum). Two types of memory are the long term and the short term memory. The long term memory stores information permanently in the brain, while the short term holds the information for a while and either transfers it to the long term memory or the memory decays.

To retrieve a specific memory from the wide memory of the brain, it activates a strand that leads to the memory, this process is called priming.

6 0
2 years ago
What are threats to computer system
Readme [11.4K]
Theft or vandalism through to natural disasters are physical threats. Non-physical threats target the software and data on the computer systems, Like hackers or just straight up viruses. Also, untrustworthy apps or games can give your computer viruses as well.
3 0
2 years ago
One tool of Lean that is a container, card, or visual limit that signals when work needs to be done or replenishment needs to be
valentina_108 [34]

Answer:

Kanban System

Explanation:

Kanban can be regarded as one of Lean tools which is been designed to carry out reduction of the idle time in a production process. The idea or concept behind this Kanban system, is to make delivery of needs of the process needs at exactly the it needs it. Kanban can be reffered to as visual cards. Kanban can as well be explained as scheduling system that is used for lean manufacturing as well as just-in-time manufacturing. Taiichi Ohno, who was an industrial engineer at Toyota carried out development of kanban so that there could be an improved manufacturing efficiency. Kanban is considered as one method used to achieve JIT.

It should be noted that Kanban System is One tool of Lean that is a container, card, or visual limit that signals when work needs to be done or replenishment needs to be initiated .

7 0
2 years ago
Publication of flaws in encryption used for copy protection is a potential violation of: A. HIPAA B. U.S. Commerce Department re
djyliett [7]

Answer:

Option C (DMCA) would be the correct choice.

Explanation:

  • DMCA is designed to govern electronic channels and tackle the problems the online revolution confronts regarding copyright.
  • DMCA's mission seems to be to accommodate the rights of intellectual property producers and investors and investigate anything other than a copyrighted material that really occurs throughout the digital environment.

The other given choice are not related to the given content. So that option C is the right one.

6 0
2 years ago
Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color's value can range from 0 to 255
maxonik [38]

Answer:

Follows are the code to this question:

#include <iostream>//defining a header file

using namespace std; //using namespace

int main() //defining main method

{

int red,green,blue,s; //defining integer variable

cout<<"Enter value: \n ";//print message

cin>>red>>green>>blue; //input value

if(red<green && red<blue)//defining if block that checks red value

s=red;//store red variable value to s variable

else if(green<blue)//defining else if block that checks green value less then blue

s=green;//store green variable value in s variable

else//defining else block

s=blue; //store blue variable value in s variable

//calculating red, green, blue value

red=red-s;//store red value

green=green-s;//store green value

blue=blue-s;//store blue value

cout<<red<<" "<<green<<" "<<blue;

}

Output:

Enter value:

130  

50

130

80 0 80

Explanation:

In the above code, inside the Main method, four integer variable "red, green, blue, and s" is defined, in which "red, green, and blue" is used for input the value from the user end.

  • In the next step, a conditional statement is used, that checks the red variable value, if the condition is true, it will store its value in the "s" variable, otherwise, it will go to else if block.
  • In this block, the green variable checks its value less than then blue variable value, if the condition is true, it will store the green value in the "s" variable, otherwise, it will goto else block.
  • In this block, it will store the blue variable value in the "s" variable, and subtract the value of "red, green, and blue" value from "s" and store its value, and at the last, it will print its value.    
4 0
2 years ago
Other questions:
  • In an ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
    7·1 answer
  • Which table style option is useful to display aggregated data when it is checked? total row filter button last column header row
    8·1 answer
  • Splunk uses ________ to categorize the type of data being indexed..
    11·2 answers
  • Nick won a $1,000 lottery prize. He can't decide what he should spend the money on. For some time now, he has been planning to b
    5·1 answer
  • A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is true if the el
    10·1 answer
  • Sara is using her personal laptop (which is password protected) at a "hotspot" at a local cafe with wifi access. She is in the m
    7·1 answer
  • Write a program that lets a user enter N and that outputs N! (N factorial, meaning N*(N-1)*(N-2)*..\.\*2*1). Hint: Initialize a
    5·1 answer
  • given the numerical value 1010101.11, which of the following number systems is most likely represented.
    11·1 answer
  • A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory
    15·1 answer
  • A data analyst is using the Color tool in Tableau to apply a color scheme to a data visualization. They want the visualization t
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!