What does the statement that follows do? double gallons[6] = { 12.75, 14.87 }; a. It assigns the two values in the initialization list to the first two elements but leaves the other elements with the values currently in memory. b. It assigns the two values in the initialization list to the first and second elements, third and fourth elements, and fifth and sixth elements. c. This statement is invalid. d. It assigns the two values in the initialization list to the first two elements and default values to the other elements.

Answers

Answer 1

Answer:

It assigns the two values in the initialization list to the first two elements and default values to the other elements.

Explanation:

Given

The array initialization

Required

Interpret the statement

double gallons[6] implies that the length/size of the array gallons is 6.

In other words, the array will hold 6 elements

{12.75, 14.87} implies that only the first two elements of the array are initialized ; the remain 4 elements will be set to default 0.


Related Questions

is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its resilience against various methods of attack. This also reduces the likelihood of a single point of failure in the security of the overall system.

Answers

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

cpp Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, which indicates a threshold. Output all integers less than or equal to that last threshold value. Ex: If the input is:

Answers

Answer:

#include <iostream>

int main() {

 // The length of the list

 int l;

 // The array containing the numbers

 int *list;

 // Threshold, last value in array

 int thresh;

 

 // Read in first value and create an array with the size of that value

 scanf("%d", &l);

 list = (int*) malloc(l * sizeof(int));

 

 for(int i = 0; i < l; i++) {

   scanf("%d", &list[i]);

 }

 thresh = list[l - 1];

 // Print the values

 for(int i = 0; i < l - 1; i++) {

   if (list[i] <= thresh) {

     printf("%d ", list[i]);

   }

 }

 

 printf("\n");

 free(list);

}

Explanation:

The program assumes at least two values are provided. The length of the list and the threshold.

We first read in an integer, and find out how many more integers we need to read. We create an array with the appropriate size, and loop through to fill the array with values. We know the last value is the threshold, and so we do one more loop to compare the values in the array with the threshold.

How does Accenture view automation?

Answers

Answer:

The description of the given question is summarized below.

Explanation:

These organizations retrained, retooled, and empowered our employees amongst all organization's internal management operating areas throughout order to create an increased automation attitude.Accenture's Innovative Software department was indeed adopting a concept called Human Plus technology, which includes this type of training.

What is hacking? Why is hacking a concern for law enforcement?

Answers

Answer:

hacking is the act of exploitation, and is typically used to steal other people's account. It is a major concern because people can easily lose their account to hackers if they're too gullible, and the hacker can use their victims' accounts to purchase the things that they want with their victims' money.

Hacking is having unauthorized access to data in a computer or a system. It's a huge concern because everything nowadays depends on the internet, and every device connected to the Internet is at risk

1. For this assignment you will print the steps for 8-bit by 8-bit multiplication.
2. Your program should read in two unsigned numbers from stdin, the first being the multiplicand and the second being the multiplier. Your program should verify that both values are within the range 0 to 255. If not, the program should print an appropriate error message and exit.
3. Your program should then initialize the simulated registers and echo the input values in decimal and also in binary.
4. Then your program should illustrate the eight steps required for multiplication using the same type of step diagrams as given in the lecture notes.
5. Finally, your program should print a check section that shows a summary of the multiplication in binary as well as in decimal. See the example below.
6. You may write your program in C, C++, or Java. If you choose to work in C, here is an example function that will allow you to represent an n-bit value within an int data type and print out the binary value in "length" bits. It uses the shift right operator and the bitwise and. (You can also choose to use unsigned int as the data type; since you are using only the lower 8 of the 32 bits in an int, there will be no apparent difference between using int and using unsigned int. However, if you choose to use char as the data type, you should use unsigned char to ensure that the compiler generates logical rather than arithmetic shifts.)
void prt_bin( int value, int length ){
int i;
for( i=(length-1); i>=0; i--){
if((value>>i)&1)
putchar('1');
else
putchar('0');
}
}
For example, if you declare acc as an int, then you could call prt_bin(acc,8) to print the 8-bit value in the accumulator.
You should format your output to exactly match the output below. 10% of the grade will be awarded for following the same format.
Sample Run is given below:
multiplicand: 33
multiplier: 55
c and acc set to 0
mq set to multiplier = 55 decimal and 00110111 binary
mdr set to multiplicand = 33 decimal and 00100001 binary
---------------------------------------------------
step 1: 0 00000000 00110111
+ 00100001 ^ add based on lsb=1
----------
0 00100001 00110111
>> shift right
0 00010000 10011011
---------------------------------------------------
step 2: 0 00010000 10011011
+ 00100001 ^ add based on lsb=1
----------
0 00110001 10011011
>> shift right
0 00011000 11001101
---------------------------------------------------
step 3: 0 00011000 11001101
+ 00100001 ^ add based on lsb=1
----------
0 00111001 11001101
>> shift right
0 00011100 11100110
---------------------------------------------------
step 4: 0 00011100 11100110
+ 00000000 ^ no add based on lsb=0
----------
0 00011100 11100110
>> shift right
0 00001110 01110011
---------------------------------------------------
step 5: 0 00001110 01110011
+ 00100001 ^ add based on lsb=1
----------
0 00101111 01110011
>> shift right
0 00010111 10111001
---------------------------------------------------
step 6: 0 00010111 10111001
+ 00100001 ^ add based on lsb=1
----------
0 00111000 10111001
>> shift right
0 00011100 01011100
---------------------------------------------------
step 7: 0 00011100 01011100
+ 00000000 ^ no add based on lsb=0
----------
0 00011100 01011100
>> shift right
0 00001110 00101110
---------------------------------------------------
step 8: 0 00001110 00101110
+ 00000000 ^ no add based on lsb=0
----------
0 00001110 00101110
>> shift right
0 00000111 00010111
---------------------------------------------------
check: binary decimal
00100001 33
x 00110111 x 55
---------------- ------
0000011100010111 1815

Answers

Answer:

Code:

#include<bits/stdc++.h>

using namespace std;  

char* prt_bin( int value, int length, char s[]){

   for(int i=(length-1); i>=0; i--){

     if((value>>i)&1) {

       s[length-1-i] = '1';  

       // putchar('1');

     }

     else {

       s[length-1-i] = '0';  

       // putchar('0');

     }

   }

   s[length] = '\0';

   return s;

}  

int main(){

     int nbits = 8, c, acc;

     char s[nbits+1];

    int multiplicand, multiplier, mq, mdr;  

   cout<<"Multiplicand: ";

   cin>>multiplicand;

   cout<<"Multiplier: ";

   cin>>multiplier;

 

    if(multiplier<0 || multiplier>255 ||multiplicand<0 || multiplicand>255){

    cout<<"Given Multiplicand or multiplier is incorrect. Exiting the program.\n";

       return 0;

   }  

   c = 0; acc = 0;

      cout<<"c and acc set to 0\n";

   mq = multiplier;

   mdr = multiplicand;

   cout<<"mq set to multiplier = "<<multiplier<<" decimal and "<<prt_bin(multiplier, nbits, s)<<" binary\n";

   cout<<"mdr set to multiplicand = "<<multiplicand<<" decimal and "<<prt_bin(multiplicand, nbits, s)<<" binary\n";

   

   printf("---------------------------------------------------\n");

    for(int i=1;i<=nbits;i++){

       printf("step %d: %d %s ",i, c, prt_bin(acc, nbits, s));

       printf("%s\n",prt_bin(mq, nbits, s));

       char lsb = s[nbits-1];  

       if(lsb=='1'){  

           printf("     + %c %s    ^add based on lsb=%c\n", c, prt_bin(mdr, nbits, s), lsb);

           printf("      ----------\n");

           acc = acc + multiplicand;

       }  

       else{

           printf("     + %c %s    ^no add based on lsb=%c\n", c, prt_bin(0, nbits, s), lsb);

           printf("      ----------\n");

       }  

       printf("      %d %s ", c, prt_bin(acc, nbits, s));

       printf("%s\n",prt_bin(mq, nbits, s));  

       printf("     >>          shift right\n");  

       mq = mq>>1;  

       if(acc%2==1){

           mq = mq+128;

       }  

       acc = acc>>1;  

       printf("      %d %s ", c, prt_bin(acc, nbits, s));

       printf("%s\n",prt_bin(mq, nbits, s));  

       printf("---------------------------------------------------\n");

   }  

   char sr[nbits*2+1];  

   printf("check:              binary   decimal\n");

   printf("                 %s        %d\n", prt_bin(multiplicand, nbits, s), multiplicand);

   printf("       x         %s  x     %d\n", prt_bin(multiplier, nbits, s), multiplier);

   printf("          ----------------    ------\n");

   printf("          %s      %d\n", prt_bin(multiplier*multiplicand, nbits*2, sr), multiplier*multiplicand);

   return 0;

}

Consider a DataFrame named df with columns named P2010, P2011, P2012, P2013, 2014 and P2015 containing float values. We want to use the apply method to get a new DataFrame named result_df with a new column AVG. The AVG column should average the float values across P2010 to P2015. The apply method should also remove the 6 original columns (P2010 to P2015). For that, what should be the value of x and y in the given code?
frames = ['P2010', 'P2011', 'P2012', 'P2013', 'P2014', 'P2015']
df['AVG'] = df[frames ].apply(lambda z: np.mean(z), axis=x)
result_df df.drop(frames, axis=y)
a. x = 1 y = 0.
b. x = 1 y = 1.
c. x = 0 y = 1.
d. x = 0 y = 0.

Answers

Answer:

x = 1 ; y = 1

Explanation:

The newly created AVG column will contain the mean value of all 6 columns(P2010, P2011, P2012, P2013, 2014 and P2015) this means that we are taking the mean across the columns as our AVG column have the same length as the initial lengtb of the data Frame as all a values in each index are averaged to create the new column. To achieve this the value 1 will be passed to the axis argument in the apply method.

To drop the previous 6 columns, we se the axis argument set to 1, this will delete the columns passed to the drop method.

Hence, both x and y values of the axis argument will take the value 1.

Type the correct answer in the box. Spell all words correctly.
Page scaling mode helps increase or reduce the size of the worksheet to fit within the set number of pages to be printed. Which option re-scales
a worksheet vertically?
To re-scale a worksheet vertically, select the number of pages in the height text box in the____group.

Answers

Answer:

Scale to fit.

Explanation:

The scale to fit group can be found in the page layout tab as it is used to deal with display of functionalities of a document and spreadsheet program. The scale to fit requires input in the width option which will dictate the width of the page in which to place the documents on. By specifying 1 for the width, this means that the document will be rescaled to fit on a single page. The automatic option may be selected for the height option which will allow the program to make an auto Decison in the shrinkage depending on the stated width value.

Company A has a project plan for a new product under development. The product will be one of many released in the coming year. The plan, if disclosed, might give Company A's competition a market advantage. Which ISO 27002 classification level is most likely assigned to this document?
a) Public Documents
b) Proprietary
c) Highly Confidential
d) Top Secret

Answers

Answer:

Company A

The ISO 27002 classification level that is most likely assigned to this document is:

b) Proprietary

Explanation:

The ISO 27002 classification levels adopted by commercial organizations are Restricted (top secret is preferred in government circles), Confidential, Internal (or proprietary), and Public. Since the new product is under development, one of many, and most likely known to the project team, the project plan will be classified as Proprietary.  Company A designates this document as Proprietary or Internal to show that disclosure of the information to its competitors is not allowed.  This level of classification shows that Company A can establish intellectual property rights over the document.

Over-activity on LinkedIn?

Answers

Answer:

Being over-enthusiastic and crossing the line always get you in trouble even if you’re using the best LinkedIn automation tool in the world.  

When you try to hit the jackpot over the night and send thousands of connection requests in 24 hours, LinkedIn will know you’re using bots or tools and they will block you, temporarily or permanently.    

This is clearly against the rules of LinkedIn. It cracks down against all spammers because spamming is a big ‘NO’ on LinkedIn.    

What people do is that they send thousands of connection requests and that too with the same old spammy templates, “I see we have many common connections, I’d like to add you to my network.”    

It will only create spam.    

The LinkedIn algorithm is very advanced and it can easily detect that you’re using a bot or LinkedIn automation tool and you’ll be called out on it.

You have two microservices that need to communicate with each other without holding up a thread on either end. One service will receive an ID and return a message once the job is complete.
Which communication framework should be used?
A.) Have a shared database that allows both
applications to read and write to the tables to share the data instead of having to communicate
B.) Use asynchronous messaging to send and receive messages between each microservice
C.) Abandon the microservice architecture so no interaction is needed
D.) Create a third service to handle the interaction between the services
E.) Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available

Answers

Answer: E. Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

Explanation:

Since there are two microservices that need to communicate with each other without holding up a thread on either end, the communication framework should be used is a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

REST is a software architectural style which is used in defining the set of rules that be used for the creation of web services. The REST architecture allows requesting systems to be able to access and manipulate web resources.

Define a generic function called CheckOrder() that checks if four items are in ascending, neither, or descending order. The function should return -1 if the items are in ascending order, 0 if the items are unordered, and 1 if the items are in descending order. The program reads four items from input and outputs if the items are ordered. The items can be different types, including integers, strings, characters, or doubles. Ex. If the input is: bat hat mat sat 63.2 96.5 100.1 123.5 the output is: Order: -1 Order: -1

Answers

Answer and Explanation:

Using javascript:

/*This function checks only for ascending order. This function cannot check ascending orders for strings, just integers or floats.*/

function CheckOrder(){

var takeinput= prompt("please enter four numbers")

var makeArray= takeinput.split("");

var numArray= new Array(4);

numArray= [makeArray];

var i;

for(i=0; i<=numArray.length; i++){

var nowElem= numArray[i];

if(numArray[1]){

Alert("let's check to see");

}

else if(

nowElem > numArray[i--]){

Alert("might be ascending order");

if(numArray[i]==numArray[2]){

var almosthere=numArray[2]

}

else if(numArray[i]==numArray[3]){

var herenow=numArray[3];

if(almosthere>herenow){

Alert("numbers are in ascending order");

}

}

}

else(

Console.log("there are no ascending orders here")

)

}

The function above can further be worked on to also check for descending order of four numbers(can also be further developed to check for strings). You need just tweak the else if and nested else if statements thus :

else if(

nowElem < numArray[i--]){

Alert("might be descending order");

if(numArray[i]==numArray[2]){

var almosthere=numArray[2]

}

else if(numArray[i]==numArray[3]){

var herenow=numArray[3];

if(almosthere<herenow){

Alert("numbers are in descending order");

}

}

}

2.
The force of impact is

Answers

Answer:

lực ( Tiếng Anh : force ) là bất kỳ ảnh hưởng nào làm một vật thể chịu sự thay đổi, hoặc là ảnh hưởng đến chuyển động, hướng của nó hay cấu trúc hình học của nó.

Explanation:

what is the python ?​

Answers

Answer:

Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation. 

This is my Opinion.

Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation.

Hope this helps you :)

Write a program that lets a user enter N and that outputs N! (N factorial, meaning N*(N-1)*(N-2)*..\.\*2*1). Hint:Use a loop variable i that counts from total-1 down to 1. Compare your output with some of these answers: 1:1, 2:2, 3:6, 4:24, 5:120, 8:40320.

Answers

Answer:

The program is as follows:

num = int(input("Number: "))

fact = 1

for i in range(1,num+1):

   fact*=i

print(fact)

Explanation:

This gets integer input from the user

num = int(input("Number: "))

This initializes factorial to 1

fact = 1

The following iteration calculates the factorial of the integer input

for i in range(1,num+1):

   fact*=i

This prints the calculated factorial

print(fact)

Suppose a program written in language L1 must be executed on a machine running a program running in language L0. What important operation must take place

Answers

Question Completion with Options:

a. Translation of the entire L1 program into L0 code

b. Translation of the L0 program into L1 code

c. Creation of a language L3 that interprets L0 instructions

d. Interpretation of each L1 statement using L0 code as the L1 program is running.

Answer:

The important operations that must take place in this scenario are:

a. Translation of the entire L1 program into L0 code

d. Interpretation of each L1 statement using L0 code as the L1 program is running.

Explanation:

Translation enables decoding to take place.  This means that the L1 program is decoded into a language that the L0 program can understand and execute.  Without this translation, the higher level language of L1 will not be understood by the machine language of the L0 programs.  Translation of a code creates a shared understanding, thereby easing program execution.  Code translation is simultaneously accompanied by interpretation.

6. It is now one of the most popular forms of entertainment, and there will always
be a need for such devices.
omotor​

Answers

Answer:

then where is question ??????

CONDUCT INTERVIEWS

Using your interview questions, interview at least three business professionals. Here are some useful tips for conducting the interviews:

Schedule an appointment for the interview for a time and place that is quiet and convenient.
Be on time and be prepared with paper and pen. You may also bring a recording device.
Be friendly and courteous; remember that the interviewee is giving you her valuable time!
Ask your questions clearly.
Don't interrupt!
Try to stay focused, but if something interesting comes up, go with it.
Take good notes. Ask the interviewee to repeat what she said if necessary, but only do this when it is something important.
Obtain all the information needed before ending the interview. If necessary, review your notes with the person.
Thank the interviewee for her time.
Write a description of the interviews in this text box.

Answers

Note that conducting a professional interview with business professionals is quite tasking and it does require skills and boldness,

Note that the questions that one need to ask are questions that are based on  the field of those business professionals, the company, your background, their dreams and aspirations and as such one should not be personal about it.

What are the  interview questions asked?

The interview questions prepared were:

Do they have the skills, expertise, and experience to carry out the job?.Are they happy and interested in current job and the current firm they are working with?.Can I fit into their team, organization culture, and firm?. etc.

Learn more about interview from

https://brainly.com/question/8846894

5. When you send your email to a bad address it may come back as a:
spam email
server email
bounced email
hypertext email
SAVE & E

Answers

Answer:

The answer is a bounced email

1.which screen appears after the password is typed (welcome, lock)​

Answers

Answer:

it should be the welcome screen I will hope so lol

Answer:

welcomeyou don't know that much also

1. Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative value. Prompt the user for an input value and try the Math.sqrt() method on it. The application either displays the square root or catches the thrown Exception and displays an appropriate message. Save the file as SqrtException.java.
2. Create a ProductException class whose constructor receives a String that
consists of a product number and price. Save the file as ProductException.java.
Create a Product class with two fields, productNum and price. The Product
constructor requires values for both fields. Upon construction, throw a
ProductException if the product number does not consist of three digits, if the
price is less than $0.01, or if the price is over $1,000. Save the class as Product.java.
Write an application that establishes at least four Product objects with valid and invalid values. Display an appropriate message when a Product object is created
successfully and when one is not. Save the file as ThrowProductException.java.

Answers

Answer:

Hence the answer is given as follows,

Write a program that prompts the user to enter a positive integer and displays all its smallest factors in decreasing order.

Answers

Answer:

<fact>[ZRjKt9sw6V(gh6E)ehNM3]<zip>

Explanation:

d. Which of the following computer has complex system? i. Hybrid computer ii. IBM computer iii. Mainframe computer iv. Analog computer​

Answers

Answer:

Hybrid computer has complex system

John downloaded the manual for his TV, called manual-of-tv.pdf, from the manufacturer's website. After he clicked twice on the document he was informed by Windows that the file could not be opened. Which software must John install to solve the problem?

Answers

Jhon must download third party pdf viewer softwares to open the .pdf file.

For example

Adobe Acrobat Reader

Must click thanks and mark brainliest

I have a variable and set it equal to 5. 1 then send it as an argument to a function that adds 5 to the variable passed in. Outside the function print the variable (after the function executes).
What will it print?
A. 5+1
B. 4
C. 6
D. 5

Answers

Answer:

D. 5

Explanation:

If the variables original value was 5 then the value that will be printed is 5. This is because the variable is being passed as a parameter into the function and 5 is being added to the parameter value, not the actual global variable outside. Therefore, in order for the adjusted value to be printed then that new value that is returned by the function needs to be saved in a new variable. This can be seen in the example code below.

3. Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest combination of coins that the user has. For example, 27 cents is 1 quarter, 0 nickle, and 2 pennies. That is 27=1*25+0*5+2*1.

Answers

Answer:

The program in Python is as follows:

cents = int(input("Cents: "))

qtr = int(cents/25)

cents = cents -qtr * 25

nkl = int(cents/5)

pny = cents -nkl * 5

print(qtr,"quarters,",nkl,"nickels,",pny,"pennies")

Explanation:

This gets input for cents

cents = int(input("Cents: "))

This calculates the quarters in cents

qtr = int(cents/25)

This gets the remaining cents

cents = cents -qtr * 25

This calculates the nickel in remaining cents

nkl = int(cents/5)

This calculates the pennies in remaining cents

pny = cents -nkl * 5

This prints the required output

print(qtr,"quarters,",nkl,"nickels,",pny,"pennies")

Write a program that uses linear recursion to generate a copy of an original collection in which the copy contains duplicates of every item in the original collection. Using linear recursion, implement a function that takes a list as user-supplied runtime input and returns a copy of it in which every list item has been duplicated. Given an empty list the function returns the base case of an empty list.

Answers

Answer: b

Explanation:

Program using linear recursion to duplicate items in a list:

def duplicate_list(lst):

   if not lst:

       return []

   else:

       return [lst[0], lst[0]] + duplicate_list(lst[1:])

# Example usage

user_input = input("Enter a list of items: ").split()

original_list = [item for item in user_input]

duplicated_list = duplicate_list(original_list)

print("Duplicated list:", duplicated_list)

How can a program use linear recursion to duplicate items in a list?

By implementing a function that utilizes linear recursion, we can create a copy of an original list with duplicated items. The function duplicate_list takes a list lst as input and checks if it is empty. If the list is empty, it returns an empty list as the base case.

Otherwise, it combines the first item of the list with itself and recursively calls the function with the remaining items (lst[1:]). The duplicated items are added to the resulting list. This process continues until all items in the original list have been duplicated and the duplicated list is returned.

Read more about linear recursion

brainly.com/question/31313045

#SPJ2

slide transition can be defined as ____ of one slide after another​

Answers

Answer:

visual effect

Explanation:

A slide transition is the visual effect that occurs when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of transition effects.

Which factors are involved in search engine optimization​

Answers

Answer:

A Secure and Accessible Website.

Page Speed (Including Mobile Page Speed)

Explanation:

Describe the purpose of shell scripts. Provide one example to reflect the use of variables, constructs, or functions.

Answers

Answer:

Kindly check explanation

Explanation:

Shell scripts are used for writing codes which may involve writing together a complete set of task in a single script. These set if codes or instructions could be run at once without having to run this program one after the other on a command line. This way it avoid having to repeat a particular task each time such task is required. As it already combines a sequence of command which would or should have been typed one after the other into a compiled single script which could be run at once.

A shell script could be written for a control flow construct :

if [expression]

then (command 1)

else (command 2)

.....

c)what formula would be in the cell E2

Answers

Excel will generally be able to handle any properly-input mathematical formula, if valid operators are used. Commonly used operators include "+" (addition), "-" (subtraction), "*" (multiplication) and "/" (division).  (Microsoft has a complete list of valid operators to be used in Excel formulas on the Office website).  Here are some examples of formulas using common operators:

Formula                                                                              Description

=C2-B2                                                                Subtracts contents of B2 from contents of C2

=C2/B2                                                                Divides contents of C2 by contents of B2

=(B2+C2+D2)/3                                                  Adds contents of B2, C2, and D2 and divides result by 3

After hitting "Enter", the cell will display the calculated value, while the formula bar will still display the formula.  (Note: Always hit “Enter” when finished entering a formula, manually.  If you click off the cell, the cell you click to will be added to your formula.)Formulas

Formulas in Excel are basically mathematical expressions that use cell references (e.g., “A5”,” D17”) as arguments.  For example, a formula that adds the contents of cell E5 and E6 could be written as follows:

 

= E5+E6

 

(Note: all formulas in Excel need to be preceded by an “=” sign.) If the values contained in E5 and E6 are 6 and 11, respectively, the formula will produce 17 as the value it displays. If you change E5 to 7, the result will automatically change to 18.

Example

Let's say you were putting together an office supply order, and you wanted to keep track of much you were spending. You could put together a spreadsheet like the one below, with the list of items to be purchased, their unit prices, the number of each item ordered, and the total spent for each.  It would make sense to enter the things you know in advance (like the price of individual items and the number ordered), but you could let Excel calculate the totals for you.  For the first item listed below (pencils), this could be done by making the value of the total price (cell D2), the value of the unit price (held in cell C2) multiplied by the number of items ordered (held in D2).  This formula would be written "=B2*C2".

Once you click "OK", your completed formula will be input into the cell.

Copying and pasting formulas

Often, you will need Excel to do a series of similar computations, where the only things that will change are the cells used as arguments.  For instance, in the example above, you would probably like Excel to calculate the Total Price for each item in the order.  You could re-input the same formula used to get the total price for pencils in each cell in that row, just changing the cells referenced (i.e. "=PRODUCT(B3:C3)", "=PRODUCT(B4:C4)", etc.), but Excel has simpler method for this. If you have multiple cells in the same row or column that need to do the same computation, you can simply copy the value in the cell you entered a formula, and then paste it into the subsequent cells.  Excel will then automatically adjust which cells are included in the formula, based upon which cell the formula was pasted to.  So, if the original formula entered in D2 was "=PRODUCT(B2:C2)", the formula pasted into D4 would be "=PRODUCT(B4:C4)"

More simply, if you have a formula you want repeated in a number of directly adjoining cells, you can just click and drag the bottom right corner of the cell with the original formula (see image below) onto the cells you want the same formula entered, and Excel will automatically copy and paste the formula for you, with appropriate adjustments made to the cell numbers in the formula.

After selecting "PRODUCT" and clicking OK, you will get another dialog box, that allows you to select the cells to be multiplied.  You can do this for individual cells, by selecting cells separately in the "Number1" and  "Number2" boxes shown below, or by selecting an array of cells, by clicking and dragging on the range cells you want to use on the spreadsheet, itself.  (Note: if you try to enter a formula in a cell using the Insert Formula button and there are adjacent cells with numbers, Excel will often select those cells automatically, so make sure the cells selected in the dialog box are the correct ones.) Excel also has built-in functions that can do a lot of useful calculations.  These are most easily accessed by hitting the Insert Function button, which is represented by the “fx” symbol next to the formula bar.  For example, instead of entering the formula shown above, the same result could have been achieved using the built-in "PRODUCT" function by clicking in cell D2 and hitting the Insert Formula button.  This would give a dialog box like the one shown, below.

After choosing “PRODUCT” and pressing OK, a new dialogue box will appear where you may choose which cells should be multiplied. By selecting particular cells in the “Number1” and “Number2” boxes as shown below, you can do this for specific cells.

What is the formula would be in the cell E2

Additionally, Excel contains many useful built-in functions that can perform calculations. The button shown by the “fx” sign next to the formula bar, “Insert Function,” can be used to access these the simplest way by clicking it.

Make sure the cells selected in the dialogue box are the proper ones because if you try to insert a formula in a cell using the Insert Formula button and there are adjacent cells containing numbers. Excel will frequently select those cells automatically.)

Therefore, by deciding a range of cells on the spreadsheet itself by clicking and dragging on the desired range of cells.

Learn more about cell E2 here:

https://brainly.com/question/6961706

#SPJ2

Other Questions
NEED ASAP!!!In this figure, AB || CD and m/_3=120 What is m/_6? Enter your answer in the box Analysis of Apple's innovation activities is the process of modifying something to make it fit certain criteria. Jeff has one month to prepare for his debate. What should he do to best prepare his argument? Check all that apply.O consider the various perspectives of each sideresearch the topic from others' points of viewOpick out an appropriate outfit for the debatecompare opposing viewpoints to his owncraft thoughtful and respectful rebuttals The "Pressure" meter allows you to read the pressure at different depths in the fluid. Place the pressure meter close to the bottom of the pool, and read the pressure. Slowly move the pressure meter toward the surface of the water in the pool and read the pressure at different depths in the pool. What happens to pressure in the fluid as the depth of the fluid decreases? Determine the product of (46.2 10^-1) (5.7 10^6). Write your answer in scientific notation.A) 2633.4 10^5B) 2.6334 10^7C) 2.6334 10^1D) 2.6334 10^5 Answer the question Why is page one of the story the importance of being earnest important?Scene: Morning-room in ALGERNON'S flat in Half Moon StreetThe room is luxuriously and artistically furnished. Thesound of a piano is heard in the adjoining room. LANE isarranging afternoon tea on the table, and after the music hasceased, ALGERNON enters.ALGERNON. Did you hear what I was playing, Lane?LANE. I didn't think it polite to listen, sir.ALGERNON. I'm sorry for that, for your sake. I don'tplay accurately any one can play accurately but Iplay with a wonderful expression. As far as the piano isconcerned, sentiment is my forte. I keep science forLife.LANE. Yes, sir.ALGERNON. And, speaking of the science of Life, haveyou got the cucumber sandwiches cut for Lady Bracknell?LANE. Yes, sir. (Hands them on a salver.)ALGERNON. (Inspects them, takes two, and sits down on thesofa.) Oh! ... by the way, Lane, I see from your book thaton Thursday night when Lord Shoreman and Mr. Worthing were dining with me, eight bottles of champagne are entered as having been consumed.LANE.Yes, sir; eight bottles and a pint.ALGERNON.Why is it that at a bachelors establishment the servants invariably drink the champagne? I ask merely for information. Why does Jefferson think the National Bank is unconstitutional find five consecutive even integers preceding -35 Find the missing length in the image below According to the theory of planned behavior, when a female student in high school considers becoming pregnant before graduating she takes into account the impressions and opinions of her peers, parents and other family and significant people. Her behavior change teeters on the _____I_______ and her _______II_______. SEE QUESTION IN IMAGE state and explain five factors that determine energy requirements in human beings Scientists have been ----------------- with various medications to eradicate the corona virus. Select one: a. experimenting b. attempted c. assembling d. designing 06. Treasure Island. 1. What is the name of that creature Jim met while running for his life into the forest and who was he before? freeware software is are available for low cost t or f Evaluate the followingexpression using x = 6:8(3x + 1)Anyone know the answer WILL GIVE EXTRA POINTS Which option is most clearly an example of satire?A.A lecture criticizing the diet of the average AmericanB.A song set to the same melody as the song it criticizesC.A documentary that reveals secrets about a celebrityD.A debate between professors with opposing beliefs Which of the following best describes most of the climate and geography of Egypt?A. MountainousB. BarrenC. RichD. Plentiful