Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Now consider the following spreadsheet:
Formula in cell D2 is = (B2/C2)
Replicating this formula (by highlighting then drag down to D7) gives all the formulas needed in cells D3 to D7
Formula in D8 (to find average) can be done in 3 ways:
= AVERAGE (C2:C7) or
= SUM (C2:C7)/6 or
= (C2+C3+C4+C5+C6+C7)/6
Formula in D9 to find out maximum value in column is = MAX (C2:C7)
- Problems associated with spreadsheets:
- Capacity (that implies maximum number of columns and rows) can be limiting when dealing with large data sets
- Security issues in some spreadsheets (it implies if you can open a spreadsheet you can also change any part of it; this can lead to fraud
- lack of concurrency; generally only one person can work on a spreadsheet at any given time (databases are better in this aspect as they can usually be opened by more than one user at a time)
- Due to their structure it's easy to enter an error (whether on purpose or by mistake) by entering data in the wrong cells or dependencies among cells incorrectly applied.
Explain FIFO Page replacement algorithm. FIFO policy: This policy only removes pages in the order they entered in the main memory. By using this policy we simply eliminate a
Discuss the advantages of Firewalls Firewalls also offer additional protection to local users who like to browse or surf out from the Intranet to the Internet, by acting as pro
What is strong-typing versus weak-typing? Which is preferred? Why? Strong type is checking the types of variables as early as possible, usually at compile time. Whereas weak ty
Q. What are the basic components of an expert system? ANSWER: There are three components of components: Information, people, and IT components. Information kinds are domain exp
Elaborate protected mode memory addressing in brief. Protected mode interrupt: In protected mode, interrupts have exactly the same assignments as in real mode though int
Q. Define HEX directive? HEX: HEX directive enables the coding of hexadecimal values in body of the program. That statement directs assembler to treat tokens in source file wh
what are the questionnaries and observation of work site for banking system?
Add 20 and (-15) using 2's complement ? Ans. Addition of 20 and (-15) by using 2's complement as (20) 10 = 1 0 1 0 0 (16
Program counter and Stack pointer all have 16 bits.
This unit introduces the most important ID terminology, explains why ID is important, and gives a description of the main ID activities and the characteristics of the ID process. I
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd