Write the vlookup formula to extract the first name

Assignment Help Computer Engineering
Reference no: EM133499686

  1. Write the vlookup formula to extract the first name of the employee whose last name is Fontana for the above data. 
  2. Write the vlookup formula to extract the title for the employee whose ID is 102. 
  3. Write the vlookup formula with IF to check to see if vlookup returns last name of the employee corresponding to ID 101 (last name is Davis). If the outcome of the vlookup is Davis, the IF returns "located", otherwise it returns "not found".

ID

Last name

First name

Title

Birth date

101

Davis

Sara

Sales representative

12/8/68

102

Fontana

Oliver

VP (sales)

2/19/52

103

Leal

Karina

Sales representative

8/30/63

104

Patten

Michael

Sales representative

9/19/58

105

Burke

Brian

Sales manager

3/4/55

106

Sousa

Luis

Sales representative

7/2/63

 

Reference no: EM133499686

Questions Cloud

Why would the defense counsel spend more time : Why would the defense counsel spend more time criticizing the forensic investigator's procedures than on the actual evidence? Is this defensive method moral
Create a simple graphical application or a game : COMP 10259- You are being asked to create a simple graphical application or a game. Since we have no back-end support, we will need to work 100% client-side.
Evaluate the security posture of a fictional company : Evaluate the security posture of a fictional company's information systems and networks. The assessment includes a comprehensive review of the company
Discuss what diagnosis you are using the tool for : Discuss what diagnosis you are using the tool for, how to score the tool, and support use of the tool with evidence and rationale.
Write the vlookup formula to extract the first name : Write the vlookup formula to extract the first name of the employee whose last name is Fontana for the above data. Write the vlookup formula to extract
Discuss how a leaders planning and prioritization can help : Discuss how a leaders planning and prioritization can help achieve data security and protect privacy using a data governance plan
What crimes may dave reasonably be charged : Bank guard Gus saw Dave and Fred running away with their guns drawn and shot his gun at Fred, killing him. With what crimes may Dave reasonably be charged?
Discuss the importance of fully engaging the clinician : Discuss the importance of fully engaging the clinician in education through simulated activity with electronic health records (EHRs) and telehealth
How can you ensure that this structure will be effective : Describe a way to structure your follow-up staff in terms of effectiveness. How can you ensure that this structure will be effective?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd