Ian needs to extract the day from the date 5/31/2017 entered in cell A1. Which formula can he use to do this

Answers

Answer 1

A cell is a box which can be seen in an Excel sheet. Ian needs to write the formula "=day(A1)".

What is Cell in an Excel?

A cell is a box which can be seen in an Excel sheet, this box is named A1, B2, etc. The name of a cell depends upon the column and the row in which it is present.

In case, if Ian needs to extract the day from the date from cell A1. He needs to write the formula:

=day(A1)

This will give the output as 31.

In case, if Ian needs to extract the weekday from the date in cell A1. He needs to write the formula,

=weekday(A1,1)

This will return a number between 1 to 7 which will represent Sunday to Saturday respectively.

Learn more about Excel:

https://brainly.com/question/3441128

#SPJ1


Related Questions

Chris needs to take the opposite of a Boolean value. Which operator does so? A. == B. != C. = D. !

Answers

AIf the boolean is A,you would have to do !a

Explanation:

the explamation mark gets the opposite.So if 5 = !A, then A = -5

(dont quote me ,im not 100% postitive)

How to unlock hp laptop forgot password without disk.

Answers

On the sign-in screen, press and hold the shift key, click the power icon , select Restart, and continue pressing the shift key until the Choose an option screen displays. Click Troubleshoot. Click Reset this PC, and then click Remove Everything. Click Only the drive where Windows is installed.

Or you can take it to a person who is a specialist in this situation.

I don’t know I don’t know I don’t know I don’t know

A ______ system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on multiple drives. Select the two correct answers, then click Done.

Answers

A raid 1 and mirrored system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on multiple drives.

What is Disk mirroring?

In data storage, disk mirroring is a term that connote the doubling of logical disk volumes into a different physical hard disks so that it will always be available.

Conclusively, Note that this is mostly used in RAID 1. A mirrored volume is known to be full logical depiction of separate volume copies and as such the answer above is correct.

Learn more about system from

https://brainly.com/question/25594630

9. With each element of the list defining both a key exchange algorithm and a CipherSpec, the list that contains the combination of cryptographic algorithms supported by the client in decreasing order of preference is the __________ .

Answers

The list that contains the combination of cryptographic algorithms supported by the client in decreasing order of preference is the CipherSuite.

What is CipherSuite?

CipherSuite can be defined as a group of instructions used to produce network connections in a secure manner.

CipherSuite is associated with Transport Layer Security, which involves the usage of algorithms to protect data.

Transport Layer Security can be defined as a computational cryptographic protocol aimed at protecting information.

Learn more about Transport Layer Security here:

https://brainly.com/question/14425531

You will read in two strings from a file cp4in_1. Txt at a time (there will be 2n strings, and you will read them until EOF) and then do the following. You alternately take characters from the two strings and string them together and create a new string which you will store in a new string variable. You may assume that each string is no more than 20 characters long (not including the null terminator), but can be far less. You must use pointers. You may store each string in an array, but are not allowed to treat the string as a character array in the sense that you may not have statements like c[i]

Answers

Use the knowledge in computational language in C++ to write the  a character array .

How to define an array in C++?

An Array is a set of values ​​arranged in lists and accessible through a positive numeric index. So, we have that each position of our Array is a variable of the type of our Array, so we have to have a way to initialize this set of variables.

So in an easier way we have that the code is:

#include <stdio.h>

#include <studlib.h>

int main()

{

File*fp;

fp=fopen("cp4in_1.txt","r");

char ch;

//while(1)

//{

while(!feof(fp))

{

char *s1,*s2,*s3;

s1 = (char*)malloc (20 *sizeof (char));

s2 = (char*)malloc (20 *sizeof (char));

s3 = (char*)malloc (20 *sizeof (char));

int i=0,j=0,x,y;

while(1)

{

ch=getc(fp);

if(ch=='\n')

break;

*(s1+i)=ch;

i++;

}

while(1)

{

ch=getc(fp);

if(ch=='\n')

break;

*(s2+j)=ch;

j++;

}

for(x=0;x<i;x++)

{

*(s3+x)=*(s1+x);

}

for(y=0;y<j;x++,y++)

{

*(s3+x)=*(s2+y);

}

for(x=0;x<i+j;x++)

{

printf("%c",*(s3+x));

}

printf("\n");

getc(fp);

}

}

See more about C++ code at brainly.com/question/19705654

The final step in the software development life cycle involves.

Answers

Answer:

Operation and maintenance

Explanation:

It involves maintenance and regular required updates.

Dropbox and Microsoft's OneDrive are both popular applications for storing files. What is a fundamental difference between Dropbox and OneDrive

Answers

The difference is that Dropbox  offers just 2 GB free storage space while  Microsoft's OneDrive gives 5 GB in terms of free storage space.

What is Microsoft OneDrive?

This  is known to be a file hosting software and it also does synchronization service given by Microsoft.

Some other  fundamental difference between Dropbox and OneDrive in terms of  Business is that Dropbox is known to often give unlimited storage for about $20 to paid user/month while OneDrive is said to only give unlimited storage for $10 per paid user/month.

Learn more about Dropbox from

https://brainly.com/question/20935392

Top/Bottom Rules allow a user to apply conditional formatting to cells that fall within the top or bottom numbers or percentile. How many items will it allow the user to include in the rule?

the top or bottom 10 items or top or bottom 10% only
the top 10 items and top 10% only
the top or bottom 100 items only
any logical number of items or percentages in top or bottom value frames

Answers

The numbers of  items that the user can include in the rule is the top or bottom 100 items only.

What is Top/Bottom Rules?

Top/Bottom Rules is known to be a rule where there is a premade form of conditional formatting which is often used in Excel to alter the set up  of cells in a range.

Note that the Top/Bottom Rules will allow a user to make changes to the top or bottom 100 items only as it only pertains to things that are up and those that are at the bottom.

Learn more about Top/Bottom Rules from

https://brainly.com/question/1862654

Write a statement that assigns the value 10 to the first element of an array of integers named minutes.

Answers

Answer:

Explanation:

i do not know what language you need because it has different syntax

Javascript:

const minutes = [];

minutes.push(10);

What are you doing to an image when you manipulate it?
A. downgrading the integrity of the image

B. creating a digital footprint of the image

C. digitally altering it

D. erasing the intrinsic data

Answers

Answer:

c digitally altering it

Direction: Complete the sentence by choosing the correct WORD

Answers

Answer:

Maybe try guestimating?

Explanation:

That's what I do sometimes.

Answer:

1. alcohol

2. tighten

3. crosshead

4. dust

5. ammoniated

6. bolts

7. loosen

What is the intermediate value of arr after two iterations of the outer for loop in the call sort(arr)

Answers

Answer: D: "Ann" "Mike " "Bill " "Lisa" "Mary" "Jose" " Shari" "Walt"

Explanation:Goes through selection sort and after 2 iterations, the largest elements are swapped with the last 2 elements of the array.

The intermediate value of arr after two iterations of the outer for loop in the call sort(arr) is option C of the image attached.

What is intermediate value in programming?

This is known to be a variable that is often employed in assisting so that one can be able to compute what they want

Concluisvely, The intermediate value of arr after two iterations of the outer for loop in the call sort(arr) is option C of the image is because it will help you to have what you are after with the codes.

Learn more about ntermediate value from

https://brainly.com/question/11195842

#SPJ2

Electronic résumés have an attractive, highly formatted appearance. please select the best answer from the choices provided t f

Answers

Answer:

true

Explanation:

An electronic resume can carry so much data about the person, and it includes images also. Then the statement is true.

What is an electronic resume?

An electronic resume is termed as a resume that is read by a computer program that summarizes the information of each person.

The electronic resume has the data such as their parent name, education, skills, job experience, hobbies, languages, and so on.

Thus, the photo of the document about the project or internship that has been done in the past can be given on the electronic resume by uploading the certificate on the computer system along with the resume.

For example, in companies like Linkedin, and so on there are many companies that ask about the person before creating an account.

More about the electronic resume link is given below.

https://brainly.com/question/2798964

flexibility
user control
mouse-free input
text alternatives
balance
enabling the user to change the font
and other elements on the page
enabling navigation for visually
impaired users who may rely
only on keyboards for pointing
and clicking
allowing blind users to understand
website images and video
allowing a web page to adjust
to different devices and screens

Answers

Hello!

The answers are:

-User control: enabling the user to change the font and other elements on the page.

-Mouse-free input: enabling navigation for visually impaired users who may rely only on keyboards for pointing and clicking.

-Text alternatives: Allowing blind users to understand website images and video.

-Flexibility: Allowing a web page to adjust to different devices and screens.

I hope that this helps you out!

You have been asked to acquire a printer for a business. You have been told that it should be easy for users to print to the printer from their smartphones and tablets. What feature should you look for when selecting the printer

Answers

A feature that you should look for when selecting the printer is a wireless connection.

What is a printer?

A printer can be defined as an electronic output (peripheral) device that is designed and developed for printing paper documents containing texts or images.

In this scenario, a feature that you should look for when selecting the printer for this business is a wireless connection because it would make it easy for users to print to the printer from their smartphones and tablets, especially through the use of a bluetooth or wifi.

Read more on printer here: https://brainly.com/question/17100575

Drag each tile to the correct box.
Match each network type to an example of what it connects.
WAN
MAN
PAN
LAN
twenty computers in an office
laptop and a cell phone
a company's offices across a city
a company's offices across a country

Answers

In order of size:
PAN — Personal Area Network (phone hotspot, Bluetooth, AirDrop)
LAN — Local (town)
MAN — Metropolitan (city)
WAN — Wide (country, continent, planet)

Twenty computer in office —> LAN
Laptop + cell phone —> PAN
Offices across city —> MAN
Offices across country —> WAN

They will choose the design team on 2 April. (change this into passive voice)

Answers

Answer:

On 2 April the design team would be choosen by them

A ________ is a type of virus that self-propagates using the internet or other computer network.

Answers

Answer:

A computer worm

Explanation:

.....................................

Web are websites that allow people to congregate online and exchange views on topics of common interest.

a. True

b. False

Answers

Answer:

B

Explanation:

B. False a web is not a Website

What do we call the kernel program that moves all of a process's frames from main memory to the disk or the other way around

Answers

Answer:

This is called the swapper

Explanation:

The swapper's main job is to move processes between memory, and storage.

True or false? a binary file can never contain image or audio data.

Answers

Answer:

true

Explanation:

It is true that a binary file can never contain image or audio data.

What is a binary file?

A binary file is one that contains data in binary format, which consists of a series of sequential bytes, each of which is eight bits long.

The content must be interpreted by a program or a hardware processor that knows exactly how the content is formatted and how to read the data in advance.

Binary files are more efficient, which is one of their benefits. In terms of memory, storing values in numeric formats like IEEE 754, rather than text characters, uses less memory.

Furthermore, binary formats provide advantages in terms of access speed. Image or audio data can never be stored in a binary file.

Thus, the given statement is true.

For more details regarding binary file, visit:

https://brainly.com/question/14593514

#SPJ2

A computer hacker trying different combinations of characters to crack a password is a ________.

Answers

Answer:

Brute force attack

When would it be necessary to shoot in 4K according to the presentation?

Answers

Answer:

because it provides you a lot of storage and the post production equipment to handle it and it is used to do big projects

Explanation:

so l know this much it is correct please mark me brainllest

Really need help Which of these are ways that hackers gain access to computer systems? Select 3 options.


data validation

data validation


phishing

phishing


packet sniffing

packet sniffing


dumpster diving

dumpster diving


layered security

layered security

Answers

The ways that hackers gain access to computer systems are:

PhishingPacket sniffingDumpster diving

What is system attack?

There are different kinds of system attack. This is where the hacker often attacks the system so as to gather data or information about a system.

The different forms of attacks  includes dumpster diving, shoulder surfing, tailgating, phishing and others. Data validation is not an attack on system.

Learn more about hackers from

https://brainly.com/question/23294592

Answer:

Phishing

Packet sniffing

Dumpster diving

Explanation:

The range of cells receiving the content of copied cells is called the ____. A. receiver cell B. final cell C. receiving range D. destination area

Answers

The paste area is indeed the set of cells that will receive copied content, and the further discussion can be defined as follows:

Range cell:  

Inside Excel, a cell range is a cell group that has been chosen. Its range is typically symmetric (square), but it can also comprise individual cells. In a formula, a cell range can also be referenced.It refers to a set of organisms that use the address of the cell first and last cells in the range, separated by a colon, instead of a single cell address.

Find out more about the range cell here:

brainly.com/question/15513083

Click this link to view O*NET’s Work Activities section for Petroleum Engineers. Note that common activities are listed toward the top, and less common activities are listed toward the bottom. According to O*NET, what are some common work activities Petroleum Engineers perform? Select four options.


performing for or working directly with the public

interacting with computers

getting information

analyzing data or information

making decisions and solving problems

assisting and caring for others

Answers

Answer: 2 3 4 5

Explanation:i got it wrong so here lol

Answer:

the first one and the last one r wrong the rest all right

Explanation:

A network administrator is importing a list of certificates from an online source, so that employees can use a chain of trust and communicate securely with public websites. Which type of certificates are the network administrator currently importing

Answers

The type of certificates that the network administrator is currently importing is Root.

What do root certificates  mean?

Root certificates are known to be the backbone of any form of authentication and security in the area of software and also usually in  the Internet.

Note that they are often  issued by the certified authority (CA) and can also be  verified by its owner and as such it is the best for the network administrator  to use.

Learn more about certificates from

https://brainly.com/question/24931496

Write the pseudocode for two modules which could be incorporated into the application planned for Lungi in Question 1.   The first module must:  a. Allow Lungi to enter the description and size of the blankets.  b. Store the details entered in arrays.  c. Provide Lungi with the option to view the list of blankets captured.  If Lungi wishes to view the list of blankets, the contents of the arrays should be passed to another module.   The second module should:  a. Receive the arrays as arguments.  b. Write the contents of the arrays to a text file that Lun​

Answers

The sample pseudocode for the given question is:

ENTER #blanket size;STORE #blanket;DISPLAY "Do you want to see the blankets captured?" #answer;IF #answer: "Yes";

What is a Pseudocode?

This refers to the informal language that is used by computer programmers to produce an algorithm and is an important step in problem-solving.

The complete pseudocode is:

THENDISPLAY #blanketELSEEND

Read more about pseudocodes here:

https://brainly.com/question/24735155

#SPJ1

A stream cipher encrypts data by XORing plaintext with the encryption key. How is the ciphertext converted back into plaintext

Answers

Answer:

A block cipher breaks down plaintext messages into fixed-size blocks before converting them into ciphertext using a key.

Explanation:

Which of the following media forms is the Federal Communications Commission able to regulate content on?
a. FM radio
b. AM radio
c. television stations
d. the Internet
d. satellite radio

Answers

Answer:

-FM radio

-AM radio

-television stations

Explanation:

Other Questions
A woman experiences the loss of a very early term pregnancy. Herfriends do not mention the loss, and someone suggests to her thatshe can "always try again." The woman feels confusion over hersadness and stops talking about it with others. Which type of griefresponse is this patient most likely experiencing? At a school assembly, there are 150 students. If the students are to be dismissed in groups of 10, how many groups will be made? Technology is the death of libraries Marco and Juan entered a trivia competition. When they miss a question,they lose points. Which statement is true about a scientific theory?a Theories are based entirely on logic, and creativity plays no role in their development.b Theories are set in stone and cannot be changed.c Theories cannot be discarded because they are based on sound science.d Theories can be revised as new knowledge expands our understanding. 100 points! Please help if you are able to. what is x and y? 2x-2y=-4 2x+y=11Is there infinitely many solutions, 1 solution, or nosolution Volume is still the number one goal of all acute care hospitals since there is no financial penalties for readmissions A. True B. False What was the collective name of the group of men who traveled with lewis and clark?. She was able to solve the difficult math test _______ ease Within a single species, howdifferent is the DNA betweenindividual organisms?A. At least 50% differentB. Exactly 100% differentC. Less than 1% different What three key factors couldve been changed to avoid tension between the USSR and the U.S? how to write a letter What is the smallest country in africa by land mass?. Emma and Ellie are twins and their birth weight can be compared using a scale of 0.75 pounds:0.9 pounds. If Emma weighed 6.4 pounds at birth, how much did Ellie weigh? Two people can experience the same event, and one may find the event to be very stressful, while the other does not. This is because: What is the answer of two times two (2x2=) A drug that blocks the action of the hormone cholecystokinin would affect. In the opening paragraphs, what is the effect of focusingon Nick Laurent rather than focusing on the punished students, their parents, orthe administration? Which two inferences could be drawn from the statistics represented in the graph?