The formula in cell C9 is B9*F10. On copying this formula to cell Z9, what will be the formula​

Answers

Answer 1

Answer:

C2 =D2+E2

Explanation:


Related Questions

Your agile team only has one database developer. So the other developers finish their tasks and then wait for their work to be Integrated into the database. This creates a backup for the database developer. But it also means that the other developers must either wait or add to a growing pile of database work. What's one possible solution to this challenge?

Answers

Members of an Agile development team often agrees on what tasks to work on and they do it together. The one possible solution to this challenge is to Have the database developer train the rest of the team so there are fewer handoffs.

Agile development team often works together as a team. They as team discuss the task yo take, when it will take place etc.

This team is all about communication, teamwork, problem-solving etc.

Conclusively, A task should be completed by one member on the team, but the team may choose to pair up when doing the work.

Learn more from

https://brainly.com/question/24383225

See full question below:

Your agile team only has one person who knows how to develop database software. So the other developers finish their tasks and then wait for their work to be Integrated into the database. This creates a pile of backed up work for the database developer. But it also means that the other developers must either wait or add to the growing pile of database work. What's one possible solution to this challenge?

Select an answer:

Have the database developer train the rest of the team so there are fewer handoffs.

Have the software developers split their time between other teams so they're not as productive

Encourage the database developer to work overtime to catch up with their work.

Create a large batch of work so the database developer can focus on finishing

please help me excel questions!​

Answers

Answer:

hi,hi,hi,hi,hi,hi,hi,hi,hi,hi,hi,hi,hi

Write a python program to print the square of all numbers from 0 to n. Where n is user input.

Answers

n = int(raw_input("Enter #:")) = [do_square(i) for i in range(1,n+1)]

steps involved in using a class

Answers

Class

Strictness And Knowledge And Behaviorr

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

Answers

Answer:

spooler

Explanation:

A print server uses a print spooler as a software holding area for jobs waiting to be printed.

Spooler lol lol lol lol

What's wrong with SontungMTP's song?
A) The passing rain
B) laylalay
C) Bigcityboy
who is a fan i know

Answers

Answer:

A

Explanation:

g Write a recursive program that causes the program to crash. How calls does it take before it crashes

Answers

Answer:

Every recursive function must have a base condition that stops the recursion or else the function calls itself infinitely. The Python interpreter limits the depths of recursion to help avoid infinite recursions, resulting in stack overflows. By default, the maximum depth of recursion is 1000 .

Explanation:

Select the three responsibilities of producers.
providing graphics
being on time
being on budget
being on target
providing collateral content
being error free

Answers

Being on time
Being on budget
Being on target

You are working part time providing computer support for a veterinarian’s office. When you arrive to work one morning, the receptionist informs you that the computer monitor is not displaying anything. List at least three steps you will perform to troubleshoot the problem, and list three possible causes.

Answers

reboot the whole computer,

Explanation:

someone being on it when they shouldn't have

a software that interprets commands from the key board and mouse is know as

Answers

Explanation:

a virus does that............

What is the meaning of s used in 0 and 1 in computer .​

Answers

Answer:

A switch, unless it's busted, can be either on or off, closed or open. A switch that is “on” or “closed” passes electrical signal through it, while a switch that is “off” or “open” blocks that signal. Computer Scientists represent an “on” switch with a 1 and an “off” switch with a 0.

Explanation:

hope this helps!!

¿por que hay peligros en internet?

Answers

Answer:

Wait

it eases off.

Get home,

gathered,

very close and look up –

we find it’s all right.

Play:

they be.

For life,

but all vanished

picture faces –

matter: I do or don’t.

More,

something

out of hold

squeeze it tightly

my best,

my best life.

Opened,

something –

back at that moment –

all marchers

the room, the door, the front

rang through the outside

Explanation:

A __________ is a special Spanning Tree Protocol (STP) frame that switches use to communicate with other switches to prevent loops from happening in the first place.

Answers

bridge protocol data units (BPDU)s is a special Spanning Tree Protocol (STP) frame that switches use to communicate with other switches to prevent loops from happening in the first place?

write a program that reads a one-line sentence as input and then displays the following response: if the sentence ends with a question mark (?) and the input contains an even number of characters, display the word Yes. If the sentence ends with a question mark and the input contains an odd number of characters, display the word No. If the sentence ends with an exclamation point (!), display the word Wow. In all other cases, display the words You always say followed by the input string enclosed in quotes. Your output should all be on one line. Be sure to note that in the last case, your output must include quotation marks around the echoed input string. In all other cases, there are no quotes in the output. Your program does not have to check the input to see that the user has entered a legitimate sentence.

Answers

We use if-else structure to check if the sentence meets the requirements for each situation.

endswith() method is used to check if the sentence ends with the target character. modulo(%) operator is used to check if the sentence contains even or odd number of charactersescape character is used to print the quotation marks in the else part

Comments are used to explain each line of the code.

#get the user input

sentence = input("Enter a sentence: ")

#check if the sentence ends with ? and has even number of characters

if sentence.endswith("?") and len(sentence) % 2 == 0:

   print("Yes")

#check if the sentence ends with ? and has odd number of characters

elif sentence.endswith("?") and len(sentence) % 2 == 1:

   print("No")

#check if the sentence ends with !

elif sentence.endswith("!"):

   print("Wow")

#used for other situations

else:

   print("You always say \"{}\"".format(sentence))

You may see a similar question at:

https://brainly.com/question/14851610

What is confidentiality and example?

Answers

Answer:

Confidentiality is the act of keeping things private. For example, the Government keeps very important things confidential in order to protect National Security.

Describe alternative storage location(s) that could be used for data backup storage. What are the advantages and disadvantages of using such locations

Answers

Answer:

fácil solo regalar a los jóvenes que y poner un stock en él

another team for confidentiality would be
A_security
B_cyber
C_cyber war
D_privacy​

Answers

I believe it’s d privacy

Evaluate the https://mwasalat.om/en-us/ website you should mention the following criteria in evaluating the website. Look & feel Usability . Readability Traffic & Suggestions to improve the system​


https://mwasalat.om/en-us/

Answers

Answer:

sorry i need points .................

Need help: what is 10^2

Answers

Answer:

100

Explanation:

Answer:

100

Explanation:

hope it helps

What is a database? A) a structured collection of related files and data B) simply a collection of data C) a data file holding a single file D) flat files used to store data

Answers

Answer:

a

Explanation:

A database is a structured collection of related files and data. The correct option is A).

What is the purpose of a database?

In computing, a database is a structured collection of data that is electronically stored and accessed. Large databases are stored on computer clusters or in the cloud, whilst small databases can be retained on a file system.

Data is kept in a single table structure in a flat file database. Multiple table structures are used by relational databases to cross-reference records. Both types of tables arrange data in rows with a single piece of information per column.

The primary purpose of every database is to store data, which includes text, images, and even media files. To store articles and other published content, user information, contact information, links to other websites, adverts, etc., all modern dynamic websites rely on one or more databases.

Therefore, the correct option is A) a structured collection of related files and data.

To learn more about the database, refer to the link:

https://brainly.com/question/13262352

#SPJ6

Which protocol should John select to prevent unwanted network access and be configured to permit traffic only from specific addresses and provide security

Answers

In order to prevent unwanted network access, John should configure a media access control (MAC) protocol to provide security and allow (permit) network traffic only from specific addresses.

The physical address of the network interface card (NIC) for a networking device is referred to as media access control (MAC) address.

Generally, this physical address is permanently configured on all networking devices and it is unique to each device.

This ultimately implies that, a media access control (MAC) address can be used to uniquely recognize and allow (permit) traffic from a network device such as a PC that is operating on a network.

In conclusion, John should configure a media access control (MAC) protocol to provide security and allow (permit) network traffic only from specific addresses.

Read more: https://brainly.com/question/24112967

Write code to assign name and density properties to currMat, and store currMat in requestedMaterials. Input first receives a name value, then a density value. Input example

Answers

The code block creates a list of tuples which holds the name and Density values of materials. The program written in python 3 goes thus ;

name = input()

#accepts name input from user

name = [n for n in name.split()]

#split the inputs

density = input()

#accepts density inputs

density = [int(d) for d in density.split()]

#split the density inputs

currMat = list(zip(name, density))

#combines the inputs into a list of tuples

requestedMaterial = currMat

#assigns to another variable

print(requestedMaterial)

A sample run of the program is attached

Learn more :https://brainly.com/question/25700348

How do you indicate a new paragraph?
<img>content</img>
<em>content</em>
<a>content</a>
<p>content</p>


Answers

Answer:

i think it says it here https://www.peachpit.com/articles/article.aspx?p=674695&seqNum=6

Explanation:

content



p = paragraph
< > is the beginning of your HTML command
> marks the end of your HTML command

You found the prime factorization of the number 72.
Explain how you can check your answer.


You’ll get 100 points. I swear.

Answers

The prime factorization for 72 is 2×2×2×3×3.

The prime factors of a number are all the prime numbers that, when multiplied together, equal the original number. You can find the prime factorization of a number by using a factor tree and dividing the number into smaller parts.

Answer:

Explanation:

Start dividing the number by the smallest prime number i.e., 2, followed by 3, 5, and so on to find the smallest prime factor of the number. Again, divide the quotient by the smallest prime number. Repeat the process, until the quotient becomes 1 after repeated division.

What is white light?
White light is when green, blue, indigo, and violet are reflected.
White light is when all colors are absorbed.
White light is when red, orange, and yellow are absorbed.
White light is when all colors are reflected.

Answers

Answer:

White light is when all colors are reflected.

thank you

A machine learning model is used to tell if an object is an apple or not. It uses 10 pictures of apples and keeps on getting it wrong. Look at the graph below. How can you make the model better?

Answers

Answer:

Add more pictures of apples to the model.

Explanation:

¿Qué tipo de información deben proteger los sitios de comercio electrónico?​

Answers

Come Estás How are you
Deben proteger la información personal, como el lugar donde vive y su dinero.

(They should protect personal information like where you live and your money)


This sentence would typically be written by a student in Spanish 2-3.

Buena Suerte!

please help me social media marketing

Answers

It’s B, just took test like this it’s was correct

You will complete this task in your own editor and upload a file named menu1.py to the zybook.
Write a function called menu_info that has two required parameters, both strings.
The first string is the name of a csv file with 1 row per menu item and 1 column per piece of nutritional information (including a header row) and the second string is the name of 1 menu item.
The function should read in the csv file and then return a list of lists. The first list is the header row and the second list is all of the data for the specified menu item.
In your file, and outside of your function, use 2 input statements to ask the user for the name of the file and the menu item. Then use those values as the parameters to call your function. Print the list of lists that is returned from your function call.
Your code should work for any csv file with this structure. A sample file can be downloaded in the lab.
Menu Summary
In your own editor, create a file named menu2.py that you will upload to the zybook for your submission.
Write a function called menu_summary that has one parameter, a string with the name of a file with the menu for a restaurant. \
The first row of the csv file is the headers. The second row tells you if 'healthy' is defined as a high or low value for that category, and then there is 1 row per menu item.
The function should read in the csv file and then create a dictionary where the keys are the nutrition headers and the values are the menu items (one per nutrition category) that have the 'healthiest value for that category. Return the dictionary.
In your file, and outside of your function, use 2 input statements to ask the user for the name of the file and the menu item. Then use those values as the parameters to call your function. Print the dictionary that is returned from your function call.
Your code should work for any csv file. You may download a sample file from the lab.

Answers

Answer:

abc

Explanation:

Which process would benefit from the use of Robotic Process Automation?

Answers

Answer:

Cost-Effective.  Accuracy & Quality. Consistency.  Improved Analytics. Increased Employee Productivity.
Other Questions
Can you describe what emotional expression is in ASL? A certain laser outputs pure red light (photon energy 1.8 eV) with power 550 milliwatts (0.55 watts). How many photons per second does this laser emit One advantage of human hair wigs is they have the same _______ as natural hair, styling and maintenance requirements texture and color styling and length the enzyme that accomplishes transcription is termed what percentage of families consisted of a married couple with a male breadwinner, a stay-at-home mom, and their children as of 2012? Which statements are true concerning a substance with a high specific heat?. How is trade still an important part of world politics NEED ANSWER ASAP!!!!!!!!!!Find the slope from the following points:(-9,3) (0,-7)10/9-10/9-4/94/-9 For A BRAINLST PLEASE HELP ASAP A clownfish attracts prey to an anemone while the anemone providesa safe home for the clownfish. This type of symbiosis, where bothspecies benefit and help each other, is called...A. ParasitismB. MutualismC. CommensalismD. Predator-preyClick to choose your answer below: Which statement about credible sources are true?(A) A credible source will have multiple ways to validate.(B) A credible source will come from online sources only.(C) A wiki page can be used as a credible source.(D) All credible sources come from .gov and .org websites. What is the name of the period when an economy begins to shrink? recession depression recovery peak. (2^-4)^-3 what is the answer to this math problem i really need help Enter a linear equation that models the situation.A drugstore sells pens for $1.50 each and notebooks for $4 each. The owner would like to sell $45 of these items each day. Use p for the number of pens and n for the number of notebooks.A linear equation that models the situation is = 45. A scale model of a rectangular living room is 6 3/4 inches by 5 1/2 inches. If 1 inch represents 3 feet of the actual room, find the area of the actual room. help asap help asap for brainlist part A and Part B i need help plz plz plz Andrew is showing his work in simplifying 4.5 + 4.2 + 5.6 7.3. Identify any errors in his work or in his reasoning. Do you think nice kids are scarce (rare) nowadays? Explain. What do you think it means to be a nice kid? Timothy and Juan are completing their homework and are having a debate about a linear equations question.Timothy said 2 + 6 (x-4) = 3x -18 + 3x has no solution, but Juan said he could prove a value existed that can be substituted for x to make it a true statement. Who is correct? Justify your reasoning. plz help i need this grade