6. Create lookup functions to complete the summary section. In cell I6, create a formula using the VLOOKUP function to display the number of hours worked in the selected week. Look up the week number in cell I5 in the range A17:G20, and return the value in the 2nd column. Use absolute references for cell I5 and the range A17:G20.

Answers

Answer 1

Answer:

Reporting period hours Timesheet Due Name 44260 Period Start 44228 Period End 40965 Summary Balances Date Completed 43722 Week # 1 Period Start Period End Worked


Related Questions

pls i need the answer rightnow pls pls pls im begging you pls​

Answers

scan
conduct
subject line
malwares
black
scams
firewalls
blocker
links
confidential

Answer:

1.  scan

2. conduct

3.  subject lines

4. firewalls

5. black

6. malware

7. scams

8. blocker

9. links

10. confidential

Identify three (3) general-purpose computing devices and write a short (no more than one page) essay explaining in detail the computing process.

Answers

The three general-purpose computing devices are desktops, notebooks, smartphones. The computing process of these devices are further explained below.

What are general-purpose computers?

A general-purpose computer is a type of computer that has the ability to carry out many different tasks. The following tasks can be performed by the general purpose computing devices:

installation of softwares,

processing of data, and

storage of processed data.

The computing process of all the general-purpose computer are the same.

It involves preparation and inputting of data into the computer using the input devices.

The data is sent to the processing unit called the central processing unit (CPU) which has the electronic circuitry that manipulates input data into the information people want.

The information is then displayed in an output device example the monitor, for the user to view.

Therefore, the three general-purpose computing devices are desktops, notebooks, smartphones.

Learn more about computing process here:

https://brainly.com/question/26409104

Restarting a computer which is already on is referred as

Answers

Answer:

what is compute

Explanation:

computer is machine

What is information computer security

Answers

Answer:

Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Explanation:

1.Skills

1.SkillsThe Top Skills Required for Cybersecurity Jobs

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...A Desire to Learn. ...

1.SkillsThe Top Skills Required for Cybersecurity JobsProblem-Solving Skills. ...Technical Aptitude. ...Knowledge of Security Across Various Platforms. ...Attention to Detail. ...Communication Skills. ...Fundamental Computer Forensics Skills. ...A Desire to Learn. ...An Understanding of Hacking

2.Thesaurus

ThesaurusCybersecurity refers to the practice of securing electronic devices from unauthorized access or attack or the measures taken in pursuit of this practice.

3.Risk assessment

Risk assessmentWhat does a cybersecurity risk assessment include? A cybersecurity risk assessment identifies the various information assets that could be affected by a cyber attack (such as hardware, systems, laptops, customer data, and intellectual property), and then identifies the various risks that could affect those assets.

and last..........is four

4. Field

FieldDifferent branches of cyber security

FieldDifferent branches of cyber securityApplication security.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.Endpoint protection and mobile security.

FieldDifferent branches of cyber securityApplication security.Network and infrastructure security.Intrusion detection and penetration testing.Digital forensics and incident response.Endpoint protection and mobile security.Data governance, risk and compliance.

Explain the distinction between a real address and a virtual address.

Answers

Answer:

A real address is the physical address in main memory. Though a virtual address is the address of a storage location in virtual memory.

hopes this help (:`

Answer:

send to you and the world is

I need help with these certain questions on my activities in school

Answers

Answer:

*part 3 multiple choice*

1 d. none of the above

2d. water

3 a. insulator

*The Other Part*

4. electrons change direction of flow frequency in ""alternating current""

2. conductors

What stands for “vlog”?

Answers

Answer:

Vlog means a Video Blog or log

Explanation:

Stay safe, stay healthy and blessed.

Have a blessed day !

Thank you

Answer ↓

"vlog" stands for "video blog"

Explanation ↓

If you have a vlog, you have a blog where most of the content is in video format. So your content is mostly videos.

hope helpful ~

in what year was CCTV added to a broadcast network?

Answers

CCTV added to a broadcast network in 1949

One problem with backlighting is that your subject may squint.

True

False

Answers

Answer:

I would say that's False. Backlighting would be behind them. So they wouldn't need to squint.

Explanation:

How many bytes/second is a 16Mbps cable modem connection?

Answers

Answer:

data transfer rate converter computer connection speed cable modem online converter page for a specific...cable modem to megabit per second(Mbps)

Under what scenarios can we clear the NVRAM by moving the PSWD jumper to the RTCRST
pins?

Answers

One can clear the NVRAM by moving the PSWD jumper to the RTCRST pins in the following scenarios:

When the computer system is on for 10 secondsWhen the jumper is set to the closed position

What is a jumper ?

A jumper (usually found on early days computers) is used when the computer needs to close an electrical circuit

The NVRAM which means a non-volatile random-access memory can be reset or clear when the computer system is on for 10 seconds and when the jumper is set to the closed position

Read more about computer at:

https://brainly.com/question/24032221

How does a workstation differ from a server in terms of price processing power storage and computer memory

Answers

Workstations are laptops and PCs that quickly perform complex, technical tasks such as digital content creation and detailed analysis. Servers are software and hardware that store data, manage network resources, and fulfill client requests.

17) If you want to find the average salary (with each employee's salary found in column C) for those who are full time employees (which will have "FT" in column B), you would use the ________ function.

A. COUNTAVERAGE


B. IFAVERAGE


C. AVERAGE


D. AVERAGEIF

Answers

Answer:

AVERAGE

Explanation:

THIS is a function used in Microsoft Excel.

The steps to find average is

Sum/Total

Hence

first we use AUtoSUM function to find sum then we use average to calculate

Answer:

Average

Explanation:

If you want to find the average salary (with each employee's salary found in column C) for those who are full time employees (which will have "FT" in column B), you would use the AVERAGE function.

12.2 E-Z LOAN
A loan obtained from a lending institution is typically paid off over time using equal monthly payments over a term of many months. For each payment, a portion goes toward interest and the remaining amount is deducted from the balance. This process is repeated until the balance is zero. Interest is calculated by multiplying the current balance by the monthly interest rate, which is usually expressed in terms of an Annual Percentage Rate (APR). This process produces an Amortization Schedule where the amount applied to interest is gradually reduced each month and the amount applied to the balance grows. For example, the following amortization schedule is for a loan of $ 10.000 at an APR of 3.9% over a term of 30 months:3 will match months 12, 24, and 30 respectively.

Answers

Following an amortization schedule, the monthly payments will be $350.39 and the total payment in 30 months will be $10511.7.

How much should be paid monthly to complete loan payment in 30 months?

The loan payment follows an amortization schedule where the amount applied to interest is gradually reduced each month and the amount applied to the balance grows.

The amounts to be paid is calculated using the amortization formula:

P = a ÷ {{[(1 + r/n)^nt] - 1} ÷ [r/n(1 + r/n)^nt]}

where

P is monthly paymenta is credit amountr is the interest ratet is the time in yearsn is number of times the interest is compounded

For the loan of $10000;

a = $10000r = 3.9% = 0.039nt = 30 months

Hence,

P = $10000 ÷ {{[(1 + 0.039/12)^60] - 1} ÷ [0.039/12(1 + 0.0.039/12)^60]}

P = $350.39 per month

Total payment in 30 months = $350.39 × 30 = $10511.7

Therefore, the monthly payments will be $350.39 and the total payment in 30 months will be $10511.7.

Learn more about amortization schedule at: https://brainly.com/question/26433770

Type the correct answer in the box. Spell all words correctly.
Craig has told his team to design a website, but he wants to see a fully laid out detailed version before functionality can be added. How can his team produce this?
Craig's team can demonstrate this by creating a(n) {----------}
.

Answers

Answer:

A project scope

Explanation:

I just took this on plato

The team designs the website according to the team leader by a project scope.

What is a website?

The website is a set of web pages located under a single domain name,  generated by a single person or any organization.

Craig has told his team to design a website, but he wants to see a fully laid out detailed version before functionality can be added.

A project can be introduced to create a website for the team members whether individually or in a team.

Thus, the team produce this by a project scope.

Learn more about website.

https://brainly.com/question/19459381

#SPJ2

9.11: Array Expander
Write a function that accepts an int array and the array’s size as arguments. The function should create a new array that is twice the size of the argument array. The function should copy the contents of the argument array to the new array, and initialize the unused elements of the second array with 0. The function should return a pointer to the new array. Demonstrate the function by using it in a main program that reads an integer N (that is not more than 50) from standard input and then reads N integers from a file named data into an array. The program then passes the array to your array expander function, and prints the values of the new expanded array on standard output, one value per line. You may assume that the file data has at least N values.

Prompts And Output Labels. There are no prompts for the integer and no labels for the reversed array that is printed out.

Input Validation. If the integer read in from standard input exceeds 50 or is less than 0 the program terminates silently.

Answers

The Array Expander is an illustration of arrays and functions.

Arrays are variables that stores multiple valuesFunctions are named statements that are executed when called

The Array Expander program

The Array Expander program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

using namespace std;

//This declares the Array Expander function

int* ArrayExpander(int *oldArr, int size){

   //This declares the new array

   int *newArr = new int[size * 2];

//This iteration sets values into the new array

   for (int i = 0; i < size * 2; i++) {

       if(i < size){

           *(newArr+i) = *(oldArr+i);

       }

       else{

           *(newArr+i) = 0;

       }

   }

//This returns a pointer to the new array

   return newArr;

}

//The main method begins here

int main(){

//This declares the length of the array, N

   int N;    

//This gets input for N

   cin>>N;

   int initArr[N];

//If N is between 1 and 50

   if(N > 0 && N <=50){

//This iteration gets values for the array

       for(int i = 0; i<N; i++){

           cin>>initArr[i];

       }

//This calls the Array Expander function

   int *ptr = ArrayExpander(initArr, N);

//This iteration prints the elements of the new array

   for (int i = 0; i < N*2; i++) {

       cout << ptr[i] << " ";

   }

   }

  return 0;

}

Read more abou C++ programs at:

https://brainly.com/question/27246607

Write a C++ program to grade the answers to a true-false quiz given to students in a course. The quiz consists of 5 true-false questions. Each correct answer is worth 2 points.

Answers

The quiz program is an illustration of loops and conditional statements

Loops are used to perform repetitionConditional statements are used to make decisions

The quiz program

The quiz program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

using namespace std;

int main(){

   //This prints the instruction

   cout<<"Enter T/t for True; F/f for False\n";

   //This initializes the question

   string questions[5] = { "Q1", "Q2", "Q3", "Q4", "Q5"};

   //This initializes the correct options

   char options[5] = { 'T','T','F','F','T'};

   //This declares the user response

   char opt;

   //This initializes the score to 0

   int score = 0;

   //This loop is repeated 5 times

   for (int i = 0; i < 5; i++){

       //This prints the current question

       cout << i + 1 <<". "<<questions[i]<<"\nAnswer: ";

       //This gets the user response

       cin>>opt;

       //If the user response is correct

       if(toupper(opt) == options[i]){

           //The score is incremented by 2

           score+=2;

       }

   }

   //This prints the total score

   cout<<"Score: "<<score;

   return 0;

}

Read more about loops at:

https://brainly.com/question/19347842

Match the product to its function.

Answers

Answer:

MYSQL: Database

MONGO DB: Database

SVELTE: Framework

JS: Language

VUE: Framework

PHP: Language

POSTGRES: Database

React: Framework (a JS library actually)

Python: Language

Homework 8 Matlab Write a function called fibonacciMatrix. It should have three inputs, col1, col2, and n. col1 and col2 are vertical arrays of the same length, and n is an integer number greater than 2. It should return an output, fib, a matrix with n columns. The first two columns should be col1 and col2. For every subsequent column:

Answers

In this exercise we have to use the knowledge in computational language in python to write the following code:

We have the code can be found in the attached image.

So in an easier way we have that the code is:

function v = myfib(n,v)

if nargin==1

   v = myfib(n-1,[0,1]);

elseif n>1

   v = myfib(n-1,[v,v(end-1)+v(end)]);

end

end

function v = myfib(n,v)

if nargin==1

   v = myfib(n-1,[0,1]);

elseif n>1

   v = myfib(n-1,[v,v(end-1)+v(end)]);

elseif n<1

   v = 0;

end

function [n] = abcd(x)

if (x == 1 || x==0)

   n = x;

   return

else

   n = abcd(x-1) + abcd(x-2);

end

end

fibonacci = [0 1];

for i = 1:n-2

   fibonacci = [fibonacci fibonacci(end)+fibonacci(end-1)];

end

>> myfib(8)

ans =

   0    1    1    2    3    5    8   13

>> myfib(10)

ans =

   0    1    1    2    3    5    8   13   21   34

See more about python at  brainly.com/question/18502436

Good people can y'all help me do this activity

For Part 1 of the activity: 1. Look around you. Talk to your friends and family. Talk to other people in your network. Keep an eye on the local news. Search on the internet. Do you observe any common problem that many of these people are facing? That just can be your business opportunity! 2. But before you jump ahead and start looking at this problem as your business opportunity, you need to first think whether you have any idea on how to solve the particular problem. You also need to find out whether the people facing this problem are even keen on a solution they have to pay for. 3. As a tip, remember that your potential customers should feel that the problem that they are facing is an acute one and their life is affected because of it......

Answers

Answer: I don't think anyone can help with that

Explanation:

Also i don't think this is coding related-

what is the important of hvac?

Answers

Answer:

Moreover, buildings need HVAC installed in them because:

HVAC systems are used for controlling the overall climate in a building. ...

HVAC fosters enhanced productivity in offices as they feel comfortable. ...

HVAC improves air quality in the building, helping make it appropriate for human breathing and comfort. ...

HVAC systems help you achieve more savings when it comes to energy bills

Explanation:

Answer:

Units larger than a terabyte include a petabyte, exabyte, zettabyte, yottabyte and brontobyte. A geopbyte is also larger than a terabyte and refers to 10 30 bytes, or 1,000 brontobytes. Additional units of measurement become necessary as the amount of data in the world increases.

Explanation:

• Do you think documentaries are best delivered in media such as films or documentary?
• Do you think only thru survey can sustain authenticity of the information need within a study?​

Answers

Answer:

I think documentaries are the best delivered in media format because it adds intrigue and lowers boredom.

I think surveys are nice for studies, but not good enough because people can click answers that they know to be false, at least, for them.

Misinformations about Corona virus

Answers

Answer:

be in a crowded place without a mark

with the aid of your own example explain how memory,registers and secondary storage all work together​

Answers

Memory, registers and secondary storage all work together​ so as to create or produce an ideal storage conditions.

How does memories works together?

The use of storage memory serves for different purposes. There is the primary storage and secondary storage that are known to work together so as to bring about a better ideal storage conditions.

An example is if a person save their work in Word, the file data is said to move the data or file from primary storage to a secondary storage device for long-term keeping.

Learn more about Memory from

https://brainly.com/question/25040884

How many intrusion switches are there in Dell Precision Tower 7920?

Answers

The number of  intrusion switches in Dell Precision Tower 7920 is one.

What is an intrusion switch?

There is an chassis intrusion switch that is often used in the detection of any unauthorized access that is found stepping into the interior of one's system.

This kind of switch is known to be often activated quickly when the system cover is removed and access is done or made to the interior of one's system.

Learn more about intrusion switch from

https://brainly.com/question/24369537

What are the major benefits of preproduction?

Answers

Some of the benefits of preproduction are that it:

Saves time while producingKeeps you on a BudgetYou could have more time to think about how you are going to produce your production.

Hope this could help?

What service handles the execution of missed cron jobs in the /etc/cron.hourly, /etc/cron.daily, /etc/cron.weekly and cron.monthly files?

Answers

The service handles the execution of missed cron jobs is /etc/crontab.

Where are /etc/crontab is system crontabs file?

This is a command that is often used by root user or daemons. It is used to configure system different kinds of jobs.

Vonclusively, Cron jobs are often seen  in the spool directories. They are known to be often stored in tables known as crontabs. This /etc/crontab. is a service handles the execution of missed cron jobs.

Learn more about commands from

https://brainly.com/question/25243683

what does the GPU do?

Answers

Answer:

With graphics processing units (GPU), many pieces of data can be processed simultaneously, which makes them useful for applications such as machine learning, editing, and gaming. It is an electronics circuit capable of accelerating the processing of images, animations, and videos.

Explanation:

19) If you want to find your lowest paid, full time employee (with "FT" in column B and each employee's salary found in column C), you would use the ________ function.

A. IFSMAX


B. MAXIF


C. MIN


D. MINIFS

Answers

Answer:

MAXIF

Explanation:

The MAXIF function is a function used in Ms Excel.

This function indicates the maximum value located on an array .

Option B

Answer:

Maxif

Explanation:

If you want to find your lowest paid, full time employee (with "FT" in column B and each employee's salary found in column C), you would use the MAXIF function.

Which one of the following tuned-adm commands will set the Tuning Profile to desktop?

Answers

The "yum search tuned" command. tuned-adm commands will set the Tuning Profile to desktop.

What is tuning profile?

The term Tuned is known to be a form of daemon that employs the use of udev to look into connected devices and so it also  statically or dynamically tunes system settings based on  a clicked profile.

Conclusively, Tuned is known to often shared with a number of predefined profiles that are often used in some common use cases such as high throughput, low latency, etc.

Learn more about  tuning profile from

https://brainly.com/question/23275071

Other Questions
What can you conclude about the relationship between height and energy? Why was the department of homeland security formed?. A credit card had an APR of 25.67% all of last year and compounded interest daily. What was the credit card's effective interest rate last year? a28.25% b29.25% c28.92% d27.32% What step should occur after you have brought the chicken broth to a boil?A)Chop the vegetablesB)Incorporate the sageC)Cook the onions and garlicD)Season with salt and pepper Students will submit 3 photographs of the same subject/object from three different points of view if you can tell me in your own words i will give you brainliest Which of the following is not a type of simple machine?A. pair of pliersB. rampC. wheel and axleD pulley help me thank youuuuu Create a table, chart, or diagram that you can use to help you decide which hypothesis test you need to use (selecting from: population proportion, a population mean, two proportions from independent samples, two means from dependent samples, and two means from independent samples). Explain your table, chart, or diagram so that someone new to statistics could use it to select the appropriate hypothesis test. what party controlled the government in Russia after the revolution state the rule obeyed by the variables in each relation diagram below If you can help me with this please and thank you The sum of the areas of two circles is 80n square meters. Find the length of a radius of each circle ifone of them is twice as long as the other.27GOWhat is the radius of the larger circle? If you were to classify a newly discovered animal, what would you want to know first?Does it live on land or in the sea?Does it have a backbone?Does it have hair?Does it have vascular tissue? The decision framework that is based on the relative distance between home and a foreign target country is the ______. Solve the following quadratic equation by factorinx - 12x + 35 = 02x? -The solution set is {}.(Simplify your answer. Type each solution only HURRY SO EASY COMPUTER IS ABOUT TO DIE AGAINThe pencils at a store cost $0.65 each. Each pencil weighs 1.85 ounces. All the pencils at the store have a combined weight of 44.4 ounces. How much would it cost to buy all the pencils at the store? Your friend tells you she is having a very hard time getting her 3-year-old toddler to pick up his toys after he's done playing with them. how would you encourage and reinforce the child's behavior in such a way that he starts picking up his toys after he's finished playing with them?Briefly explain using learning theories Why do you think democratic societies tend to lean toward capitalistic economies and totalitarian regimes tend toward socialism? In your opinion, why are there so many anti-Asian hate crimes worldwide during the past year? please help me.. no links pls