This is an example of what type of formula? =average(d1:d17) question 1 options: addition subtraction range average
Answer:
d average
Explanation:
The average is the ratio of the sum of the observation to the total number of observations. Then the correct option is D.
What is average?Average is simply defined as the mean of the given set of numbers. The mean is considered as one of the measures of central tendencies in statistics. The average is said to be an arithmetic mean.
The average is given as
[tex]\rm Average = \dfrac{Sum\ of\ the\ observation}{Total\ number\ of \ observations}[/tex]
This is an example of the average formula.
More about the average link is given below.
https://brainly.com/question/521501
Correctly installed tubing is installed in a neat fashion with bends that follow existing _____. Group of answer choices rules contours trends assumptions
Correctly installed tubing is installed in a neat fashion with bends that follow existing contours.
What is tubing?Tubing is known to be the original flow conduit that is often employed by people to move created fluids to the surface or in fluids formation.
Note that it is often used in wells and as such, a rightly installed tubing is installed in a good and clean way with bends that follow existing contours.
Learn more about tubing from
https://brainly.com/question/17274244
Gary was browsing through a programming website currently on prog. Edu/homepage. Html. There were few related links on the page. He clicked on a link that had the term "Learn Testing. " This link led him a website called learntotest. Edu/learntesthome. Html. Which is the entry page in this
case?
A. Learntotest. Edu/learntesthome. Html
Ð. Learntotest. Edu
C. Prog. Edu/homepage. Html
D. Prog. Edu
The entry page in this scenario above for Gary is Learntotest. Edu/learntesthome. Html.
What is HTML?HTML is known as HyperText Markup Language. This is said to be a kind of code that is often written and used to make standard a web page and all of its content.
Conclusively, Note that all HTML documents often begins with a document type declaration such as : <!DOCTYPE html> as in the case above
Learn more about HTML from
https://brainly.com/question/4056554
Please help me on this it’s due now
A Card class has been defined with the following data fields. Notice that the rank of a Card only includes the values from Ace - 10 (face cards have been removed):
class Card {
private int rank; // values Ace (1) to 10
private int suit; // club - 0, diamond - 1, heart - 2, spade - 3
public Card(int rank, int suit) {
this.rank = rank;
this.suit = suit;
}
}
A deck of cards has been defined with the following array:
Card[] cards = new Card[40];
Which of the following for loops will populate cards so there is a Card object of each suit and rank (e.g: an ace of clubs, and ace of diamonds, an ace of hearts, an ace of spades, a 1 of clubs, etc)?
Note: This question is best answered after completion of the programming practice activity for this section.
a
int index = 0;
for (int suit = 1; suit < = 10; suit++) {
for (int rank = 0; rank < = 3; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}
b
int index = 0;
for (int suit = 0; suit < = 4; suit++) {
for (int rank = 0; rank < = 10; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}
c
int index = 0;
for (int rank = 1; rank <= 10; rank++) {
for (int suit = 0; suit <= 3; suit++) {
cards[index] = new Card (rank, suit);
index++;
}
d
int index = 0;
for (int suit = 0; suit < = 3; suit++) {
for (int rank = 1; rank < 10; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}
Answer: b
Explanation: i did this one!!!!!!!!!!
Janis is working on a project on a project with some classmates. Which word processing features can they use while authoring the project report
Answer:
Use the word project
Explanation:
Its just a guess
Janis will use the word project for authoring the project report.
What is Project Report?A project report is a document that provides information on the general state of the project or particular aspects of its performance. Regardless of the report type, it includes project data based on managerial, technical, financial, economic, or production elements.
Writing a project report helps you identify and comprehend the requirements for the success of your project. It makes your ideas clear to you.
Any firm needs information from a variety of sources, including technical, financial, economic, production, and managerial information. They are important during the inception, growth, and expansion phases of a business.
To know more about Project Report follow the link.
https://brainly.com/question/6905384
#SPJ5
Can someone answer this question please because i didn't understand.
Name the icon you use on your graphical user interface the least. Explain why you rarel use it.
Answer:
Read below
Explanation:
Your graphical user interface is essentially your home screen on your phone or computer. You interact with the icons of apps on your phone. This question is worded kind of weird, but I would assume that you would just pick the app you use the least and explain why.
Select all examples of ethical and appropriate use of business e-mails.
1 ) Claudia shares a joke with her coworkers.
2) Celia forwards an e-mail asking for donations to the relief fund for hurricane victims.
3) Lucia sets up a 2:00 meeting with her marketing team.
4) Iris sends a message about a rally to stop the sale of furs.
5) Ken deletes a message from his boss without reading it.
6) Karl sends a graphic to his coworker in an attachment. Karl sends a graphic to his coworker in an attachment.
Answer:
Number 3 only I believe, sorry if im wrong.
Explanation:
You conduct an experiment to find the probability of a flipped coin landing on
heads or tails. You flip the coin 10 times, with a result of 8 heads and 2 tails,
and conclude that the probability of a coin landing on heads is 80%. Why did
you get inaccurate results?
A. The size of the coin wasn't considered.
B. The sample size was too small.
C. There is only one head and one tail, so the results should be 50%
each.
O D. You didn't flip the coin high enough.
Answer:
Experimental probability describes how frequently an event actually occurred in an experiment. So if you tossed a coin 20 times and got heads 8 times, the experimental probability of getting heads would be 8/20, which is the same as 2/5, or 0.4, or 40%.
An animated film that you have seen that was particularly effective. which characteristics made it successful?
If you want to make a successful animation, you could think about the graphics and how smooth the characters look. You could make sure the mouths are in sync with the voices. Make sure the theme of the animation is gripping and think about your audience. An example is Pixar Studios. Their main target audience is children, but their content is still good for all ages. A good idea is to make your content family-friendly, this will make sure you get more watchers.
I hope this could help you...
Which of the following is a benefit of using a passphrase?
A. A passphrase is easy for the creator to remember
B. A passphrase can be shorter than a standard password
C. A passphrase will never need to be updated, even if it was compromised in a breach
D. All of the above
Answer:
Brainliest pls
Explanation:
The benefit of passphrases is that they make it easier for a user to generate entropy and a lack of order—and thus more security—while still creating a memorable credential. Generating entropy through randomized characters can be difficult, but this also makes it more difficult to launch a cyberattack against you.
The following is a benefit of using a paraphrase is D. All of the above.
What is a paraphrase?Paraphrasing manner placing a person else's thoughts into your personal words. Paraphrasing a supply includes converting the wording even as retaining the authentic meaning. Paraphrasing is an opportunity to quote.
The advantage of paraphrases is they make it simpler for a consumer to generate entropy and a loss of order—and for that reason extra security—even as nevertheless growing a memorable credential. Generating entropy thru randomized characters may be tough, however, this additionally makes it extra tough to release a cyberattack on you.
Read more about the paraphrase :
https://brainly.com/question/17174600
#SPJ2
While talking to a new client, the client asked you why access control is mostly used in enterprise networks rather than home networks. How should you reply
The way a person should reply the client is that An enterprise network will have more sensitive and confidential information.
What are sensitive and confidential information?Sensitive and confidential information are known to be any kind of information that a person or any business organization do not want to disclosed such as trade secrets.
Note that telling or convincing a client that An enterprise network will have more sensitive and confidential information will help them make the right choice.
See options below
How should you reply?
The devices required for access control can only be afforded an enterprise
An enterprise network will have more sensitive and confidential information
Access controls can only be configured by security admins
Enterprises attract more business when using access control.
Learn more about client from
https://brainly.com/question/25385643
the oppurtunity cost of earning an advanced college degree is that
You can use it to win arguments on the internet
Answer:
you like to say hi
Explanation:
new ppl are wihn
When trying to find a machine that is needed to access the data can be difficult. What is this an example of?.
There are different kinds of computer language. The above is an example of Machine language. It is also a kind of input devices.
Why machine language?Machine language is known to be a type of language that can only be understood by a computer. It is therefore very difficult for a person to understand as it is the only thing that the computer system can use.
When a person is trying to find a machine that is needed to access the data, it will be be difficult as one is not familiar with the machine language and what can be the best tool to use.
Learn more about Machine language from
https://brainly.com/question/5045657
Who is the founder of C language?
Answer:
Dennis Ritchie is the founder of C language.
What is one reason why businessman want to move entirely online
A method that executes because it is called automatically when an appropriate event occurs is an event ____. A) Responder B) Listener C) handler D) source
In programming a typical type of method that executes when an event is trigered is called event handler
C) handler Event Handler
Event HandlersWhat are handlers?
Handler are codes that runs on the background thread in a multithreaded programme, the executes series of operation when an events trigers their operations.
Learn more about handlers here:https://brainly.com/question/20028260
easy python question, no explanation just right answer
Answer:
See the code below.
Explanation:
def sumOfTwo(a, b, v):
output = False
for i in a:
for j in b:
sum = i + j
if sum == v:
output = True
print(output)
sumOfTwo([-4, 6, 1], [10, .5, 30], 6)
You can use any online python ide to check the code.
Which three steps might be included in an algorithm for a digital thermostat?
✓ A. The thermostat uses the resistance detected to calculate the
temperature.
B. The thermostat sends an electrical signal to either the air
conditioner or the heater.
C. The thermostat measures electrical resistance with its thermistor.
O D. The thermostat automatically installs itself by wiring itself to the
house's electrical system.
Answer:
Explanation:
It certainly isn't D. It would cost a fortune to make that happen. It's not impossibe. Just impractical.
It's not A. Resistance is a floating physical thing present in the air.
B could be correct, but there is a better answer.
The answer is C. A thermistor is a resistance that is temperature sensitive.
A ________ is any business event that generates data worthy of being captured and stored in the organization’s database.
In a typical information security program, what is the primary responsibility of information (data) owner
The typical responsibility of the information that an owner is to determine the level of sensitivity or classification level.
What is an information security program?The information security program is a set of activities, projects, and initiatives that help an organization IT framework and help the organization meet all the business goals leading to corresponding to the benchmarks. The main duty of the data owner is to determine the level of sensitivity of the data.
Find out more information about information security.
brainly.com/question/25226643
write an QBASIC programme to find the area of circle
CLS
INPUT “ENTER RADIUS”; R
A = 3.14 * R ^ 2
PRINT “AREA OF CIRCLE IS ”; A
END
FOR loops are considered to be which of the following:
A. primarily pretest conditional loops
B. used for conditional statements
C. counter controlled loops
D. post test conditional loops
Answer:
C. counter controlled loop
Explanation:
A counter controlled loop, is a loop that repeats a specific number of times. If it is known how many times a loop must repeat or perform a certain task, it is a count controlled loop (for loop).
- It must initialize a counter variable to a starting value.
- It must test the counter variable by comparing it to a maximum value. When the counter variable reaches its maximum value, the loop terminates.
- It must update the counter variable during each iteration. This is usually done by incrementing the variable.
A distinguishing feature of methods that have the reserved word void in the method header is that they have:.
Answer:
no return statements
Explanation:
A distinguishing feature of methods that have the reserved word void in the method header is that they have no return statement.
What is reserved word?Reserved words are expressions that have been designated for a certain purpose but cannot be used when naming variables. For instance, "print" is a reserved term since it is used to display text on a screen in many different languages.
Operating systems employ reserved words as a way to designate a device file or another service. The MS-DOS and Windows operating systems' reserved terms are listed below.
For instance, if you try to save a file as CON or CON.txt, you can get an error saying the file already exists or that the name is reserved.
Therefore, A distinguishing feature of methods that have the reserved word void in the method header is that they have no return statement.
To learn more about no return statement, refer to the link:
https://brainly.com/question/14894498
#SPJ2
A _______ is a group of elements that you want to style in a particular way.
a. id
b. element
C. class
a id is a group of elements of that you want to style in a particular way
Answer:
Brainliest
Explanation:
C. class
Consider the following code segment. What is the value of result after the code segment is executed? (WILL GIVE BRAINLIEST IF CORRECT)
A) 6
B) 10
C) 15
D) 21
Answer:
I think its B or C
Explanation:
After the code segment is executed, the value 6 is returned. As a result, option A is correct.
What is a code segment?A text segment is one of the sections of a programme in an object file or memory that contains executable instructions. It is also known as text or a section of code.
It stores static constants rather than variables, in contrast to the code segment, also known as the text segment, which is read-only on many architectures.
Exons are coding segments, while introns are non-coding segments. The BSS section, on the other hand, contains uninitialized constants and variables.
Demographic, psychographic, geographic, and behavioural segmentation are examples of the four types of segmentation.
These are typical examples of how businesses can segment their markets based on factors such as gender, age, and lifestyle.
Thus, the correct option is A.
For more details regarding code segment, visit:
https://brainly.com/question/20063766
#SPJ3
One way to insert a page break is to choose page break from the Insert tab.
true or false
One way to check if a website is secure is to look for a/an
in the address bar.
Answer:
One such sign to look for is in the URL of the website. A secure website's URL should begin with “https” rather than “http”. The “s” at the end of “http” stands for secure and is using an SSL (Secure Sockets Layer) connection. Your information will be encrypted before being sent to a server.
T - True. One way to check if a website is secure is to look for a padlock icon in the address bar.
How does this work?This padlock indicates that the website is using a secure HTTPS connection. HTTPS encrypts the data transmitted between the user's browser and the website, ensuring that sensitive information such as login credentials or financial details remains private and protected from unauthorized access.
Additionally, a secure website's address will start with "https://" instead of "http://". Users should always verify these security indicators before entering any personal or sensitive information on a website to safeguard their online privacy and security.
Read more about websites here:
https://brainly.com/question/28431103
#SPJ2
Please help me on this it’s due now
Answer:
I believe the answer is both A and B
explanation : I just read thru both and I chose the one that seemed to make more sense I hope you get it right
In order to link to another page on your web site, you need to know the target page name and:
a
The name of your web server
b
The character encoding of the target page
c
The numeric address of the target location
d
The path to the target page from your current page location
Answer:
I belive it would be D or C
Explanation:
Thats the only 2 answeres that would logically make since