=(A2+A3)*12% is an example of a function in excel true or false

Answers

Answer 1
False but I’m not to sure

Related Questions

Which denial of service (DoS) attack generates a large number of ICMP echo requests from a single request, acting like an amplifier and causing a traffic jam in the target network

Answers

The denial of service (DoS) attack that generates a large number of ICMP echo requests from a single request, acting like an amplifier is a  fraggle attack.

What does a Fraggle attack function as?

A Fraggle Attack is known to be a type of a denial-of-service (DoS) attack that entails the sending of a huge amount of spoofed UDP traffic to a given  broadcast address of a router that is often seen in a given network.

Note that  It is said to work in a similar way like the smurf Attack, that often uses spoofed ICMP traffic and as such, the denial of service (DoS) attack that generates a large number of ICMP echo requests from a single request, acting like an amplifier is a  fraggle attack.

Learn more about DoS attack  from

https://brainly.com/question/13068595

#SPJ1

Can someone answer this question please because i didn't understand.

Name the icon you use on your graphical user interface the least. Explain why you rarel use it.

Answers

Answer:

Read below

Explanation:

Your graphical user interface is essentially your home screen on your phone or computer. You interact with the icons of apps on your phone. This question is worded kind of weird, but I would assume that you would just pick the app you use the least and explain why.

Consider the following code segment. What is the value of result after the code segment is executed? (WILL GIVE BRAINLIEST IF CORRECT)

A) 6
B) 10
C) 15
D) 21

Answers

Answer:

I think its B or C

Explanation:

After the code segment is executed, the value 6 is returned. As a result, option A is correct.

What is a code segment?

A text segment is one of the sections of a programme in an object file or memory that contains executable instructions. It is also known as text or a section of code.

It stores static constants rather than variables, in contrast to the code segment, also known as the text segment, which is read-only on many architectures.

Exons are coding segments, while introns are non-coding segments. The BSS section, on the other hand, contains uninitialized constants and variables.

Demographic, psychographic, geographic, and behavioural segmentation are examples of the four types of segmentation.

These are typical examples of how businesses can segment their markets based on factors such as gender, age, and lifestyle.

Thus, the correct option is A.

For more details regarding code segment, visit:

https://brainly.com/question/20063766

#SPJ3

A ________ is any business event that generates data worthy of being captured and stored in the organization’s database.

Answers

the answer is transaction

Which of the following is a benefit of using a passphrase?
A. A passphrase is easy for the creator to remember
B. A passphrase can be shorter than a standard password
C. A passphrase will never need to be updated, even if it was compromised in a breach
D. All of the above

Answers

Answer:

Brainliest pls

Explanation:

The benefit of passphrases is that they make it easier for a user to generate entropy and a lack of order—and thus more security—while still creating a memorable credential. Generating entropy through randomized characters can be difficult, but this also makes it more difficult to launch a cyberattack against you.

The following is a benefit of using a paraphrase is D. All of the above.

What is a paraphrase?

Paraphrasing manner placing a person else's thoughts into your personal words. Paraphrasing a supply includes converting the wording even as retaining the authentic meaning. Paraphrasing is an opportunity to quote.

The advantage of paraphrases is they make it simpler for a consumer to generate entropy and a loss of order—and for that reason extra security—even as nevertheless growing a memorable credential. Generating entropy thru randomized characters may be tough, however, this additionally makes it extra tough to release a cyberattack on you.

Read more about the paraphrase :

https://brainly.com/question/17174600

#SPJ2

Please help me on this it’s due now

Answers

Bottom right goes first then top right for the second part!

list four pointing devices and describe the four pointing devices ​

Answers

Answer:

Common pointing devices

Mouse.

Trackball.

Joystick.

Pointing stick.

Explanation:

Hope this helps


2. Asterisk (*) symbol in criteria for query stands for:
(al Any number of characters
(b) One character
C zero characters

Answers

Answer:

The answer is A

Explanation:

The Asterisk symbol (*) is used in all fields.

A Card class has been defined with the following data fields. Notice that the rank of a Card only includes the values from Ace - 10 (face cards have been removed):

class Card {

private int rank; // values Ace (1) to 10
private int suit; // club - 0, diamond - 1, heart - 2, spade - 3

public Card(int rank, int suit) {
this.rank = rank;
this.suit = suit;
}
}

A deck of cards has been defined with the following array:

Card[] cards = new Card[40];

Which of the following for loops will populate cards so there is a Card object of each suit and rank (e.g: an ace of clubs, and ace of diamonds, an ace of hearts, an ace of spades, a 1 of clubs, etc)?

Note: This question is best answered after completion of the programming practice activity for this section.

a
int index = 0;
for (int suit = 1; suit < = 10; suit++) {
for (int rank = 0; rank < = 3; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}

b
int index = 0;
for (int suit = 0; suit < = 4; suit++) {
for (int rank = 0; rank < = 10; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}

c
int index = 0;
for (int rank = 1; rank <= 10; rank++) {
for (int suit = 0; suit <= 3; suit++) {
cards[index] = new Card (rank, suit);
index++;
}

d
int index = 0;
for (int suit = 0; suit < = 3; suit++) {
for (int rank = 1; rank < 10; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}

Answers

Answer: b

Explanation: i did this one!!!!!!!!!!

While talking to a new client, the client asked you why access control is mostly used in enterprise networks rather than home networks. How should you reply

Answers

The way a person should  reply the client is that An enterprise network will have more sensitive and confidential information.

What are sensitive and confidential information?

Sensitive and confidential information are known to be any kind of information that a person or any business organization do not want to disclosed such as trade secrets.

Note that telling or convincing a client that An enterprise network will have more sensitive and confidential information will help them make the right choice.

See options below

How should you reply?

The devices required for access control can only be afforded an enterprise

An enterprise network will have more sensitive and confidential information

Access controls can only be configured by security admins

Enterprises attract more business when using access control.

Learn more about client from

https://brainly.com/question/25385643

Alejandro wants to post an animation on his social media page that shows a series of slightly different images displayed in sequence. What type of animation should he select

Answers

The type of animation that Alejandro should select show a series of images displayed in sequence is: Animated GIF.

What is graphic design?

Graphic design can be defined as an artistic process that is used for the creation of various art works and animations.

In the creation of various graphic files such as in 2-D or 3-D, graphic designers can use a variety of software applications or programs to create still images and animations.

In this scenario, Alejandro should select an animated graphics interchange format (GIF) to show a series of images displayed in sequence.

Read more on graphic design here: brainly.com/question/25299426

Eric just signed up for his first college class after being out of school for nearly a
decade. He goes to the bookstore the week before class starts to get his book, and
he's surprised to learn that he only needs an access card. How will Eric be
accessing the course material for his college class?

Answers

The way Eric can access the course material for his college class is to use the LMS also known as course management system (CMS)

What are course material?

Course Materials are known to be the courses, documentation, educational materials needed for a specific course.

Conclusively, The LMS is the known to be the background into which instructors often input course content and when Eric access it, he can be able to get the course content.

Learn more about course material from

https://brainly.com/question/4371674

A _______ is a group of elements that you want to style in a particular way.

a. id
b. element
C. class

Answers

a id is a group of elements of that you want to style in a particular way

Answer:

Brainliest

Explanation:

C. class

Which file in linux would i need to modify in order for a local user to connect to a new site i created by just entering the site name in the browser

Answers

I attached my answer because Brainly wouldn't let me post it. It is important  to be detailed since you are setting up a DNS server to do this.

One way to insert a page break is to choose page break from the Insert tab.

true or false

Answers

true that is a way to insert a page break

What is a menu?
another name for a window
a section that allows you to choose settings
a set of commands that provides quick access to a tool
a list of commands and options for working with a program

Answers

Answer:

a list of commands and options for working with a program

Explanation:

Please help me on this it’s due now

Answers

Answer:

I believe the answer is both A and B

explanation : I just read thru both and I chose the one that seemed to make more sense I hope you get it right

Select all examples of ethical and appropriate use of business e-mails.

1 ) Claudia shares a joke with her coworkers.
2) Celia forwards an e-mail asking for donations to the relief fund for hurricane victims.
3) Lucia sets up a 2:00 meeting with her marketing team.
4) Iris sends a message about a rally to stop the sale of furs.
5) Ken deletes a message from his boss without reading it.
6) Karl sends a graphic to his coworker in an attachment. Karl sends a graphic to his coworker in an attachment.

Answers

Answer:

Number 3 only I believe, sorry if im wrong.

Explanation:

A _____ is a grid that displays fields as columns and records as rows.

Answers

Answer: it is a datasheet because data is like a a place to keep things in and you can organise that in many different way's

What is one reason why businessman want to move entirely online

Answers

• You can reach a large number of people at once. This aids in the expansion of a firm and the sale of any goods.

• When compared to offline business, if you have your own product, you can quickly sell it to thousands of people online (offline business are also good business but you need to so many time to reach thousand people and customer)

• When you sell a product globally, people complain that it's difficult to track product and profit, but when you sell a product online, it's the greatest and easiest way to track product and profit.

• You will be able to reach out to people all around the world, which will benefit you and your company. You will be aware of the needs of people all around the world. Your company's clientele spans the globe.

Who is the founder of C language?​

Answers

Answer:

Dennis Ritchie is the founder of C language.

Gary was browsing through a programming website currently on prog. Edu/homepage. Html. There were few related links on the page. He clicked on a link that had the term "Learn Testing. " This link led him a website called learntotest. Edu/learntesthome. Html. Which is the entry page in this

case?

A. Learntotest. Edu/learntesthome. Html

Ð. Learntotest. Edu

C. Prog. Edu/homepage. Html

D. Prog. Edu

Answers

The entry page in this scenario above for Gary is  Learntotest. Edu/learntesthome. Html.

What is HTML?

HTML  is known as HyperText Markup Language. This is said to be a kind of code that is often written and  used to make standard a web page and all of its content.

Conclusively, Note that all HTML documents often begins with a document type declaration such as : <!DOCTYPE html>  as in the case above

Learn more about HTML from

https://brainly.com/question/4056554

User inserts 10 numbers. Write a program that will show if there are more positive or negative numbers among the entered numbers.

Answers

Here is a basic program that I wrote.  This will check how many positive/negative numbers are in the table and then prints the amount..

Using Python

# list of numbers

list1 = [10, -21, 4, -45, 66, -93, 1]

 

pos_count, neg_count = 0, 0

 

# iterating each number in list

for num in list1:

     

   # checking condition

   if num >= 0:

       pos_count += 1

 

   else:

       neg_count += 1

         

print("Positive numbers: ", pos_count)

print("Negative numbers: ", neg_count)

One way to check if a website is secure is to look for a/an
in the address bar.

Answers

Answer:

One such sign to look for is in the URL of the website. A secure website's URL should begin with “https” rather than “http”. The “s” at the end of “http” stands for secure and is using an SSL (Secure Sockets Layer) connection. Your information will be encrypted before being sent to a server.

T - True. One way to check if a website is secure is to look for a padlock icon in the address bar.

How does this work?

This padlock indicates that the website is using a secure HTTPS connection. HTTPS encrypts the data transmitted between the user's browser and the website, ensuring that sensitive information such as login credentials or financial details remains private and protected from unauthorized access.

Additionally, a secure website's address will start with "https://" instead of "http://". Users should always verify these security indicators before entering any personal or sensitive information on a website to safeguard their online privacy and security.

Read more about websites here:

https://brainly.com/question/28431103

#SPJ2

You have a user who has difficulty typing. She is constantly pressing keys multiple times by accident. Which keyboard accessibility option should you enable? Mouse keys Bounce keys Sticky keys Repeat keys

Answers

The answer is option B, Bounce keys

You conduct an experiment to find the probability of a flipped coin landing on
heads or tails. You flip the coin 10 times, with a result of 8 heads and 2 tails,
and conclude that the probability of a coin landing on heads is 80%. Why did
you get inaccurate results?
A. The size of the coin wasn't considered.
B. The sample size was too small.
C. There is only one head and one tail, so the results should be 50%
each.
O D. You didn't flip the coin high enough.

Answers

Answer:

Experimental probability describes how frequently an event actually occurred in an experiment. So if you tossed a coin 20 times and got heads 8 times, the experimental probability of getting heads would be 8/20, which is the same as 2/5, or 0.4, or 40%.

C. The probability of choosing something could either be this or that . Considering this, the probability of obtaining a head should be 50%

O B. the bulk of a person's income.
a
C. a person's excess income.
Those taking illegal drugs, or using a prescription drug without a medical need, are likely ...
A. to be making a calci

Answers

im confused by the formatting of this- maybe type it again ;-;

difference between local technology and model technology with example​

Answers

The differences? Speed, size, storage or load, or just plain work-load, between ‘modern,’ and trad. technology is probably easiest to compare. We tend to think of communication tech, and computation tech when we say ‘modern,’ but traditional? Lets define that just a bit. Are we talking machines and devices, or the uses themselves, like fire from rubbing two sticks together to fire from an ‘electronic,’ cigarette lighter?Some things are just novelties. There are times when cheap, non electronic devices provide practical and very necessary service in places where an electronic device is too high-maintenance to be equally practical. There is no need to put a computer on a well pump if you’re in a back-water where electronic replacement parts are hard to come by. You just hand pump the thing and it works fine and at your convenience. Certain ‘Green,’ tech, like solar ovens, are a far cry from a fire pit, or even a gas barbecue, and though it’s marketed as ‘new’ technology, depending of course on design and materials used, it is very low-tech. Useful technology seems really only cosmetically changed, with new clothes over old bones, so-to-speak. A different package, a different color, but it’s the job it does that matters. The best comparison between ‘modern,’ tech and ‘traditional,’ tech that springs to mind though, is that modern tech is very modular and if it breaks it’s often disposable, rather than fixable, for most of us.
The differences between modern and traditional technologies are: Traditional technology was based on simple laws and mechanics while modern technology is formed by the integration of many simple mechanics. Modern technology is built on the existing traditional technology. An example of local technology is plough, water mill and water pump. Example of model technology could be a statue or a painting.

Please help……Your friend is taking images from all over the internet without giving credit to the sources. He tells you that it’s no big deal, and no one will know or care anyway. Help your friend by explaining why it is important to follow copyright laws when photos are needed.

Answers

Answer:

For people who generate creative content, copyright regulations are crucial. It safeguards their works from being utilized without their permission or in ways that they do not approve of. If you successfully profited by utilizing someone else's copyrighted work, in this example their images, you may be required to pay monetary damages, and the court may order you to stop using his/her content without their agreement. A federal judge may potentially seize your work and compel you to delete them right away.

How does the quantity of data affect the accuracy of an experiment?
A. The more data is collected, the more accurate predictions and
results can be.
B. The less data is collected, the more data scientists have to search
for.
C. The less data is collected, the less likely it is that the experiment
will have to be repeated.
D. The more data is collected, the more time scientists spend
analyzing the results and predictions.

Answers

The more data that is collected, the more accurate predictions and results can be.
Other Questions
When you listen to a lecture, the information is held in ____ memory until you write it in your notes. On several occasions Odysseus came to grief because How do you recognize a geometric sequence? Can you find terms within a geometric sequence using a formula? The high score for a video game is 36,480. Your current score is 34,280. Each dragonfly you catch is worth 1 point. You also get a 1000-point bonus for reaching 35,000 points. Select an inequality that represents the number d of dragonflies you must catch to earn a new high score. Then solve the inequality.Which one is right? How are the expected counts calculated when a chi-square goodness-of-fit test is conducted?. A sequence can be generated by using a,n = a,n (-1) + 2, where a,1 = 6 and n is a whole number greater than 1. What are the first 5 terms in the sequence?A.) 6, 12, 24, 48, 96B.) 2, 8, 14, 20, 26C.) 2, 12, 72, 432, 2592D.) 6, 8, 10, 12, 14 The point (7,7) is a point on the terminal side of theta. What is the exact value of csc theta in simplest form? 1. What is a verdict? A. It is the sentence imposed upon the defendant. B. It is the plea that is placed before the court by the defendant. C. If is the decision made by the jury. D. It is the accusation of the victim. Hi guys can you please do this only question 6 and 8 ty write the correct form of the verb in the space then, decide whether the verb should be preterite or imperfect by placing a "p" or an "i" in the blank .Cuando nosotros (ser)_______ ______(p or i) nios, Jorge y yo ____ (vivir)____ (p or i) en la Argentina. Siempre____ (ir) (p or i) ______a la playa, a Mar del Plata, para pasar las Navidades. All nosotros casi siempre (quedarse) ______ (p or i)______ en el Hotel Fnix. Un ano nuestra familia (decidir)______ (p or i)____ quedarse en otro hotel, el Continental. No nos (gustar) ______ (p or i)_____ tanto como el Fnix y por eso, al ao siguiente, nosotros (quedarse) _____(p or i)_____ en el Fnix otra vez. someone help me with my homework Analyze the style of the painting of An Old Man's Reminiscences by Asher Brown Durand. Can you be very Descriptive, please? At least two Paragraphs Please what is value laden exchange? Mis hermanos y yo ____ Argentina muy bienA. Saben B. SabemosC. SabeisD. Conocemos 7 Use the information and your knowledge of science to answer the question.During an investigation, two German Shepherds with long hair were each bred with a German shepherd with short hair ina first-generation cross. The offspring from each first-generation cross were then bred to produce a second-generationcrossWhich questions could be answered using the results of this investigation? Can someone help pls Solve the absolute value inequality 3x-1 I WILL GIVE BRAINLYEST AND 60 POINTS. Please help me ASAP.Rectangle PQRS is plotted on a coordinate plane. The coordinates of P are ( 1, 4) and thecoordinates of Q are ( 1, 4). Each unit on the coordinate plane represents 1 centimeter, andthe area of Rectangle PQRS is 64 square centimeters. Find the coordinates of Points R and Sgiven these conditions:.aPoints R and S are to the left of Points P and Q.bPoints R and S are to the right of Points P and Q How many times greater is 7,000,000( 7 million ) than 700,000(700 thousand)? In "Mending Wall," why do the speaker and the neighbor repair the wall?A. to keep cows off their propertyB. to compete with each otherC. to continue a traditionD. to please the speakerPoem below: Something there is that doesn't love a wall,That sends the frozen-ground-swell under it,And spills the upper boulders in the sun,And makes gaps even two can pass abreast.The work of hunters is another thing:I have come after them and made repairWhere they have left not one stone on a stone,But they would have the rabbit out of hiding,To please the yelping dogs. The gaps I mean,No one has seen them made or heard them made,But at spring mending-time we find them there.I let my neighbor know beyond the hill;And on a day we meet to walk the lineAnd set the wall between us once again.We keep the wall between us as we go.To each the boulders that have fallen to each.And some are loaves and some so nearly ballsWe have to use a spell to make them balance:'Stay where you are until our backs are turned!'We wear our fingers rough with handling them.Oh, just another kind of out-door game,One on a side. It comes to little more:There where it is we do not need the wall:He is all pine and I am apple orchard.My apple trees will never get acrossAnd eat the cones under his pines, I tell him.He only says, 'Good fences make good neighbors'.Spring is the mischief in me, and I wonderIf I could put a notion in his head:'Why do they make good neighbors? Isn't itWhere there are cows?But here there are no cows.Before I built a wall I'd ask to knowWhat I was walling in or walling out,And to whom I was like to give offence.Something there is that doesn't love a wall,That wants it down.' I could say 'Elves' to him,But it's not elves exactly, and I'd ratherHe said it for himself. I see him thereBringing a stone grasped firmly by the topIn each hand, like an old-stone savage armed.He moves in darkness as it seems to me~Not of woods only and the shade of trees.He will not go behind his father's saying,And he likes having thought of it so wellHe says again, "Good fences make good neighbors."