How do I use the VLOOKUP function to find the course grade on this excel sheet.

Answers

Answer 1

Answer:

Explanation:i don't know

if you would give me more of an idea on what you are doing i could help


Related Questions

Your tasks include identifying competitors, determining your company's market penetration and consulting market research sources. These tasks are examples of:
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

search engine optimization (SEO).
B

off-site Web analytics.
C

on-site Web analytics.
D

pay-per-click.

Answers

Answer:

B. off-site Web analytics.

Explanation:

Marketing can be defined as the process of developing promotional techniques and sales strategies by a firm, so as to enhance the availability of goods and services to meet the needs of the end users or consumers through advertising and market research. The pre-service strategies includes identifying the following target market, design, branding, market research, etc.

Market research can be defined as a strategic technique which typically involves the process of identifying, acquiring and analyzing informations about a business. It involves the use of product test, surveys, questionnaire, focus groups, interviews, etc.

Web analytics refers to a strategic process which typically involves the collection of data, as well as the study of user behavior in an attempt to enhance or boost market share and sales. It is divided into two main categories;

I. on-site Web analytics.

II. off-site Web analytics.

In this scenario, your tasks include identifying competitors, determining your company's market penetration and consulting market research sources. These tasks are examples of off-site Web analytics.

Design a software system for a bookstore that keeps an inventory of two types of books: Traditional books and books on CD. Books on CD may also contain music. The bookstore purchases books from publishers and sets a price for each book. Customers can purchase books from the bookstore, using either cash or a credit. The bookstore keeps track of which books it has in its inventory, and the books purchased by each customer

a. What are the objects in your object- oriented Solution?
b. What are the interactions between objects in your solution?
c. Which objects "have" other objects?
d. Which Objects "Use" other objects?
e. Which objects are other objects?

Answers

Answer:

Explanation:

a. In this scenario, the best solution would have an Object of Traditional Books, CD, Music, Bookstore and Customer.

b. All five objects would be able to be called by the main program loop and the Customer Object would call upon and use either the Books or CD object, While the Bookstore object would call upon all of the other objects.

c. Both the Bookstore object and Customer object will "have" other objects as the Bookstore needs to hold information on every Book or CD in the Inventory. While the Customer object would call upon the Book and CD object that they are purchasing.

d. The Music Object will extend the CD object and use information on the CD object as its parent class.

e. Since the Music Object extends the CD object it is also considered a CD since it is in CD format like the Books on CD and therefore is both objects.

Why did Elena Gilbert Turn her humanity off when she was sired to Damon? (In The Vampire Diaries)

Answers

Answer:

Ok, so when her brother died she couldn't take it and was in denial for like the longest time. And since she was still sired to Damon bofre her humanity was off she could still listen to him.

Explanation:

It is for employees to make mistakes that compromise the security of an organization’s computer devices and sensitive information.

impossible
difficult
easy

Answers

Answer: Easy

Explanation: Correct on my Edg 2021.

It is simple for employees to make mistakes that jeopardize a company's computer system security and sensitive data.

What exactly is sensitive data?

Sensitive information has been defined as personal data that includes facts or opinions concerning a person's race or ethnicity. political affiliations or beliefs. beliefs in religion or philosophy. Data that needs to be shielded from unwanted access in order to protect the security or privacy of a person or organization is considered sensitive information.

Pattern-based classifiers called sensitive information types (SIT) are used. To see a complete list of all SITs, see Sensitive information types entity definitions. They look for sensitive information like social security, credit card, or bank account numbers to identify sensitive things.

Therefore, It is simple for employees to make mistakes that jeopardize a company's computer system security and sensitive data.

To know more about sensitive information visit;

brainly.com/question/26191875

#SPJ3

The rhythmic note that three beats is called a____half note.

Answers

Answer:

it is called a dotted half note

Answer:
Dotted half note

Swapping Order of Vowels Write a program to swap the order of the vowels in a given word. For example, if the word is programming, the output is prigrammong. Here, the initial order of vowels is o, a, i which changes to i, a, o. Assume that the letters of the words are in lowercase.

Answers

Answer:

Program is as follow:

Explanation:

#include<iostream.h>

#include < conio.h>

bool isVowel(char b)

{

return

( b=='a' || b=='A' || b=='e' || b=='E' || b=='i' || b=='I' || b=='o' || b=='O' || b== 'u' || b=='U');

For swaoing the vowels

string reverseVowel ( String str)

{

int j = 0;

string v ;

for ( int i= 0 ; str [i]]!='0'; i++)

if( isv(str[i]))

v[j++] = str[i[;

for ( int i = 0; str[i]! = '0' ; i++

if ( isv (str[i]))

str{i} = v [--j]

return str;

}

int main ()

{ string str = " Programming";

cout<<swapv(str);

return 0 ;

}

Antivirus is a program that detects error.True or False.​

Answers

Answer:  false

Explanation:

Because it isn't true.

PLEASE HELP ME WITH THIS PYTHON CODE::::: THANKS!!!



Lists are an example of a data abstraction.


A data abstraction can often contain different types of elements. It also provides a separation between the abstract properties of a data type (integer, boolean, string) and the concrete details of its representation. Basically, it doesn’t matter that the type are different!


Create an empty list. Append the integer 3, a string of "hello" and a boolean of False into the list. Print out each index individually. Now, remove the number 3 and False from the list.


Finally, print out the list again.

Answers

Answer:

Explanation:

The following Python code does exactly as requested. Once the list is created and the elements are added to it, it uses a for loop to print out each element individually. Then once the loop is over it removes the 3 and False elements from the list and creates another for loop to print the remaining element(s) individually again.

my_list = []

my_list.append(3)

my_list.append("hello")

my_list.append(False)

for x in my_list:

   print(x)

my_list.remove(3)

my_list.remove(False)

for x in my_list:

   print(x)

can you help me with this question please ​

Answers

d. half period because it is the converting of bidirectional current flow to unidirectional currency flow.

g Consider the turning point problem again, but this time you are given a sequence of at least three integers, which consists of a decreasing subsequence followed by an increasing subsequence. Using the divide and conquer technique, develop a recursive algorithm that finds the index of the turning point in the sequence (that is, the point where it transitions from a decreasing subsequence to an increasing subsequence). For example, in the sequence [43 30 16 10 7 8 13 22], the integer 7 is the turning point and its index is equal to 4 (assuming the starting index is 0). So, the algorithm should return 4

Answers

Answer:

Explanation:

The following code is written in Python, it creates a recursive function that takes in a list as a parameter, then compares the first two items in the list if the first is greater, it increases the index by one and calls the function again. This is done until the turning point is found, it then prints out the position of the turning point int the list.

def find_turning_point(list, x=0):

   if list[x] > list[x + 1]:

       x += 1

       return find_turning_point(list, x)

   else:

       return "The turning point position is: " + str(x)

What is used to prevent all vlans from going across a trunk?

Answers

If you want to play Valorant with me my name is
Ticklemyguitar and my riot id is 2735

You were just hired as an IT Specialist for Smalltown School District. Your first assignment is to review a problem area& in student records processing. It seems that the program currently used to compute student grade point averages and class rankings runs terribly slow and as a result end of year reports are habitually late. Your are asked to come up with a list of items that should be checked in order to determine if a modification to code is in order. The IT department head is asking you to do this without the opportunity to actually see the current application/programs in use. What questions would you ask about the current code? What areas of code would you look at? What would you need to know about the student data?

Answers

Answer:

Explanation:

There are various questions that you can ask in this scenario, such as

What grading policies are being implemented?

How many student grades are being calculated by the program?

What is the requirements for a student to pass?

All of these questions would allow you to get an idea of how extensive the code may be and its complexity. Once you know this you would look at the code revolving around actually looping through the data and doing the necessary calculations. You can then determine how to manipulate the code and make it much more efficient.

You would also need to know how the student data is being saved, which will help determine if it is the best data structure for saving this type of data or if it can be replaced in order to maintain the data secure while increasing the speed of the program. Mainly since this information needs to be continuously used from the data structure.

In QBasic, create a number guessing challenge. Your program should generate a random number from 1-
100 (inclusive). Let the user guess a number. The program should let the user guess until they get the
correct number. After each input, the program should tell the user whether they guessed the correct
number, or if they guessed too high or too low. While the user is entering guesses, the program should
keep a count of the number of guesses that it takes to get the correct number. After the user guesses
the correct number, the program should congratulate the user and tell them how many guesses it took
them to get the correct number. By the way, if the user chooses carefully, they should be able to guess
the number within 7 tries. But, your program should still let the user keep guessing until they guess the
correct number

Answers

Answer:

yes

Explanation:

A mathematical process of coding information so that only the intend user can read it

Answers

Answer:

asymmetric encryption with the intended user's public key.

Explanation:

Only that user will be able to decrypt the information.

Match the OOP concept to its definition.
encapsulation
data abstraction
inheritance
derived class
defines a class in terms of another class
arrowRight
inherits the properties of a base class
arrowRight
provides only essential information to the world
arrowRight
binds data and functions together
arrowRight

Answers

Answer:

defines a class in terms of another class = inheritance

inherits the properties of a base class = derived class

provides only essential information to the world = data abstraction

binds data and functions together = encapsulation

Explanation:

Other Questions
The question that is asked... Question 1 (1 point)Replace the bolded word or words in the first sentence with the correct direct object pronoun in the second sentence:Tu regardes la tlvision? Je regarde deux heures par jour (1 point)leI'lesla The proportion of California residents who reported insufficient rest or sleep during each of the preceding 30 days is 8.0%, while this proportion is 8.8% for Oregon residents. These data are based on simple random samples of 11,545 California and 4,691 Oregon residents.(a) Conduct a hypothesis test to determine if these data provide strong evidence the rate of sleep deprivation is different for the two states.(b) It is possible the conclusion of the test in part (a) is incorrect. If this is the case, what type of error was made? Find the circumference of the circle with a radius of 7 Which is an example of a statistical question?QuestionsQuestion 1 How many pets does Alisha have at home?Question 2 What is your favorite kind of pet?Question 3 Do you like having a pet?Question 4 What is Alishas pets name?question 1question 2question 3question 4 Please guys help me please no links Select ALL of the following genotypes below that respresent males. XXY XX XYY XXX XY What terms of praise does Rudolfo Anaya apply to Chvez in the elegy? Cite evidence from the text to support your answer. ( Elegy on the Death of Cesar Chavez) PLZ ANSWER AS FAST AS U CAN IF U DO YOU WILL BE MARK BRAINILIST Which cell is represented by the avocado's skin Could someone explain to me what the nullification crisis is, I look online and find it hard to understand so could you try to explain it as best you can? Do you guys now the answer I need it ASAP please Independent PracticeAre whole numbers, integers, or rational numbers the most reasonable for the situation?a temperature in a news reportA.integersB.whole numbersC.rational numbers a. Find the length of the midsegment of an equilateral triangle with side lengths of 12.5 cm.b. Given that UT is the perpendicular bisector of line segment AB, where T is on AB, find the length of AT given AT = 3x + 6 and TB = 42 - x.c. Given angle EFG has angle bisector FH, where EF = GF, find the value of y if EH = 5y + 10 and HG = 28 - y. What is the point-slope of y+5=-7/4(x-4) What is the 100th term in the sequence 11, 22, 33, 44, 55 ? mareli rides her dirt bike at 20 meters/second for 500 seconds, how far did she ride? Using the image below, determine what type of solution the LYSED cell is in.Captionless Image a.Not enough information is providedb.Hypotonicc.Isotonicd.Hypertonic The model represents 3 1/5 Which multiplication can you use to check the answer?Three squares are shown. Each square is divided into 5 fifths.A. 3 x 1/5= 3/5B. 15 x 1/5 = 3C. 15 x 3/5 = 9D. 15 x 5/3 =25 How did the opening of the Suez Canal affect shipping routes? Diz Co. is a U.S.-based MNC with net cash inflows of euros and net cash inflows of Swiss francs. These two currencies are highly correlated in their movements against the dollar. Yanta Co. is a U.S.-based MNC that has the same level of net cash flows in these currencies as Diz Co. except that its euros represent net cash outflows. Yanta Co has a higher exposure to exchange rate risk than Diz Co.Required:Which firm has a higher exposure to exchange rate risk? Why?