!! NEED HELP FAST !!

The mathematical order of operations is used in Excel when formulas are evaluated. This order of operations states the order to be
    
  A. multiplication and division, addition and subtraction, exponentiation.

  B. addition and subtraction, multiplication and division, exponentiation.

  C. multiplication and division, exponentiation, addition and subtraction.

  D. exponentiation, multiplication and division, addition and subtraction.
 

Answers

Answer 1
D is the correct answer, I hope this helps you
Answer 2
B. addition, subtraction, multiplication, and division, exponentiation.


Related Questions

Under normal operations, cisco recommends that you configure switch ports on which vlan

Answers

 

You can configure switch ports on default VLAN under normal operations. Cisco switches always have VLAN 1 as the default VLAN, which is required for many decorum communications between switches like spanning-tree protocol for example. It is obligatory not to delete or even change the default VLAN.

 

 





Which is NOT one of the four key pieces of personal information you should protect from identity thieves?

Anniversary

Date of birth

Social Security number

Street address

Answers

Final answer:

An Anniversary is not considered a key piece of personal information to protect from identity thieves, unlike a Date of birth, Social Security number, or Street address. Always safeguard sensitive information and use strong security measures to prevent identity theft.

Explanation:

The piece of personal information that is NOT one of the four key pieces you should protect from identity thieves is an Anniversary. While it's important to safeguard personal dates to some extent, they are generally not as sensitive as your Date of birth, Social Security number, or Street address, which are more commonly used by identity thieves. Never give out sensitive information like your internet password or Social Security number; even your bank will usually ask only for the last four digits for account access.

Protecting your personal information is crucial in the digital age. It is important to protect your mail, credit and debit cards, wallet, and to use strong, hard-to-guess passwords and PINs. Utilize anti-virus software to keep your computer secure, and always notify your bank and other important institutions when you change your address or phone number to avoid potential identity theft.

As we engage more online, participating in social networking, online shopping, and storing information on the web, our risk of falling victim to identity theft increases. Therefore, maintaining online privacy and security is vital to protect against identity theft, as seen in numerous large-scale data breaches affecting companies and individuals alike.

ap courses are almost always taught:

A. at the nearest community college.

B. at the nearest junior college.

C. online

D. in high school

Answers

I think the answer is D.
i do believe in high school but if i am not correct then it might be online.

A collaborative web page that is designed to be edited and republished by a variety of individuals is known as a(n) ____.

Answers

A collaborative Web page that is designed to be edited and republished by a variety of individuals is called ad Wiki. A wiki is a server program that allows users to collaborate in forming the content of a Web site. The term comes from the word "wikiwiki," which means "fast" in the Hawaiian language.The simplest wiki programs allow users to create and edit content.

Which routine is configured to execute first when the program runs?
A. Subroutine
B. Start
C. Fault
D. Main

Answers

it's D because of ok

How can you recognize an unsecured wireless network?

Answers

An unsecured wireless network is a network that does not use an encrypted authorization mechanism, such as WPA2 or similar. 

Which of these do the fonts Wingdings and Dingbats display?

A.mathematical equations


B.symbols


C.Greek letters


D.meteorological information

Answers

I believe Wingdings and DIngbats depicts random symbols. I hope that answered your question, my friend. :)

Which file system is used by large-capacity usb and memory cards?

Answers

Answer:

External

Explanation:

An external file system uses large-capacity usb and memory cards

True or false: you cannot change the default margin size for word documents.

Answers

False the answer is for that question

Your organization is using the 192.168.1.0/24 address space. you will need 28 subnets. what subnet mask would you use to create these subnets?

Answers

d is the answer bischhhhhhhhh

Project managers have the overall responsibility for planning, executing, and completing a project.
A) True B) False

Answers

The given statement "Project managers have the overall responsibility for planning, executing, and completing a project." is True because Project managers are responsible for ensuring that a project is completed within its budget, scope, and timeframe.

Project managers have the overall responsibility for planning, executing, and completing a project, ensuring that the project's objectives are met within the stipulated time and budget constraints. Project managers must identify and manage risks, monitor progress, and make adjustments as needed to keep the project on track. They must also ensure that all deliverables meet the requirements and quality standards specified in the project plan.

In the planning phase, project managers work on defining the project's scope, setting goals, and developing a detailed project plan. This involves coordinating with stakeholders, establishing a timeline, identifying required resources, and outlining the necessary tasks and responsibilities.

During the execution phase, project managers oversee the implementation of the project plan by allocating resources, monitoring progress, and adjusting the plan as needed to address any unforeseen issues or changes. They communicate with the project team and stakeholders, making sure everyone stays on track and works towards achieving the project's objectives.

Finally, project managers are responsible for the completion of the project. This involves ensuring that all project deliverables have been met, conducting a thorough review of the project's performance, and conducting a lessons-learned analysis. The project manager also takes care of project closure activities, such as releasing resources, finalizing documentation, and celebrating the project's success.

In conclusion, project managers have the overall responsibility for planning, executing, and completing a project, as they are instrumental in guiding the project through its various stages while ensuring that it achieves its intended goals.

Know more about Project managers here :

https://brainly.com/question/30457233

#SPJ11

Random access memory (ram) is also sometimes called _____ storage.

Answers

It is also sometimes called Volatile storage

If I wanted to share files only within my organization and limit my employees from sharing information with external people, what type of network should I set up in my office?

Extranet
Internet
Peer-to-Point
Intranet

Answers

If I wanted to share files only within my organization and limit my employees from sharing information with external people, what type of network should I set up in my office?

Extranet<====
Internet
Peer-to-Point
Intranet

hopes this helps

The type of network that should be used to set up in the office as per the given scenario, is extranet. The correct option is A.

What is extranet?

An extranet is a controlled private network that provides access to partners, vendors, and suppliers, as well as an authorized group of customers, to a subset of the information available on an organization's intranet.

An extranet is a private network similar to an intranet, but it is typically accessible to third-party parties such as business partners, suppliers, key customers, and so on.

An extranet's main purpose is to allow users to exchange data and applications as well as share information.

Extranets enable you to communicate and collaborate more effectively with clients, customers, and stakeholders through a secure network.

Consolidate processes such as online ordering, order tracking, and inventory management to integrate supply chains.

Thus, the correct option is A.

For more details regarding extranet, visit:

https://brainly.com/question/13263185

#SPJ5

What does BIOS stand for?

Answers

Basic Input/Output System
This stands for basic input/output system

I hope this helped.

Is Microsoft Word a:

A.operating system
B.software
C.hardware
D.input device

Answers

b. software





-----------------------------

Program ____ let programmers write code using a word processing-like interface.​

Answers

Program "editor" let programmers write code using a word processing-like interface.​

This is utilized by programming software engineers; gives them a chance to compose code utilizing a word processing like interface that usually includes functions, like, AutoCorrect and AutoComplete.it is also called text editor.

A style is named group of formatting characteristics. True or false

Answers

The answer for this question is True.

Douglas Engelbart is credited with the invention of _____

Answers

He created computer mouse

Douglas Engelbart is credited with the invention of the computer's mouse.

Who was Douglas Engelbart?

Douglas Carl Engelbart was a successful and great American engineer. He was also an inventor, and the early computer and Internet pioneer. He was born on January 30, 1925, in Portland, Oregon, U.S. He died on July 2, 2013, in Atherton, California.

This American inventor was known for his huge and most important discoveries in the field of science and technology. His work begins in 1950 and led to his patent for the computer mouse, the development of the basic graphical user interface (GUI), and groupware.

He was musing about how to migrate a cursor on a computer display successfully and effectively. Due to this search, he make a device that is known as a mouse.

Therefore, Douglas Engelbart is credited with the invention of the computer's mouse.

To learn more about computer's mouse, refer to the link:

https://brainly.com/question/29637932

#SPJ2

Which type of variable is visible to every module and the entire program?

Answers

Global







------------------------------------------

In a windows ____ , each computer maintains a list of users and their rights on that particular computer.

Answers

server?
.................

What happens when you click the edit header option in the header button drop-down list?

Answers

When you click the edit header option in the header button drop-down list the header pane and the Header &Footer tools Design tab are displayed.
The Headers and Footers are pieces of text, or graphics, that appear at the top and bottom of a page.There are three options for the placement of page numbers. 

Read the following scenario: A project will require more people than originally estimated. Identify the possible risks to the project.
a.) Ideas and Creativity
b.) Money and resources
c.) Policies and Procedures
d.) Time and work ethic

Answers

The correct answer is b.Money and Resources because the more people involved in a project then the more money being invested. 

Answering the question, the possible risk to the project is money and resource because the available resources could only take care of the people that were initially positioned to execute the project

Project risk can be defined as uncertain situations that can occur in a project. Such uncertain conditions can affect the project.

Further Explanation

There is always a risk that accompanies a project because there are different unseen circumstances that might likely show up during project execution.

However, there are different types of risk and these include

Stakeholder riskRegulatory riskTechnology riskExternal risk

Stakeholder risk: stakeholders are people that have a major interest in the execution of a project. Stakeholders, in this case, can be mangers, customers, etc. stakeholders risk may arise if the stakeholders do not the required capacity to get the project done

Regulatory Risk: some regulations such as government regulations might also pose some risk to a project.

Technology risk: some times, to execute a project might require the use of new technology and the organization can’t afford to get the new technology, it may have affects the outcome or the execution of the project.

External risk: an organization may also rely on outside support to executive a project and since the support is not within the control of the organization, it might affect the execution of the project.

LEARN MORE:

Read the following scenario: A project will require more people than originally estimated. https://brainly.com/question/6500857Read the following scenario: A project will require more people than originally estimated https://brainly.com/question/5755515

KEYWORDS:

money and resourcesproject riskmore peopleestimatedunseen circumstances

A person would probably suffer the most severe electric shock by completing a circuit through his or her A. left hand to right hand. B. right hand to right foot. C. left hand to left shoulder. D. right hand to right shoulder.

Answers

left hand to right hand. electricity will always take the shortest path to the other side. if it goes through both of your arms that means it is going to cross or get very close to stop your heart. remember. only 7 milliamps are needed to stop a heart. 1 amp is over 100 times stronger.

You can add chart and axes titles on the chart tools format tab or with the chart elements buttom. true or false

Answers

Select the chart. Navigate to the Chart Layouts group on the DESIGN tab. Open the drop-down menu named 'Add Chart Element'. In Excel 2010 you have to go to the Labels group on the Layout tab and click the Axis Title button. From Axis Title options choose the desired axis title position: Primary Horizontal or Primary Vertical.

If a kindergarten teacher was making a handout to teach children different geometric shapes,he could use the feature in the word application to develop his visuals

Answers

He could create shapes using the insert shape feature on most word processors.
Contact i'm kinda confused but i think i am right not sure hope i helped????!!!!!

How many bytes is a yobibyte

Answers

i think the answer is 1 x 10^24 bytes
1 yobibyte is 1.209e+24 bytes.

That is a lot!

I hope this helps

Which of the following best describes the Distribution Mix?

A: a network independent companies through which a product passes from produced to end user.
B: the combination of distribution channels by which a firm gets its products to end users.
C: an individual or firm that helps to distribute a product.
D: an intermediary who sells products to other businesses for resale to final customers.

Answers

B) The combination of distribution channels by which a firm gets its products to end-users.

The answer is: B. the combination of distribution channels by which a firm gets its products to end users.

The purpose for creating a distribution mix in order to ensuring that they can deliver the proper amount of product at the correct time. A company that has a full distribution mix would obtain full command on its inventory storage, warehousing, communications process,  packaging of the product, and transportation process.


Which command on the page layout ribbon enables a user to mark where a new page will begin on the printed copy?

Answers

Answer:

Breaks

Explanation:

Q:

Which command on the Page Layout Ribbon enables a user to mark where a new page will begin on the printed copy?

A:

Breaks

The fields you use to order your data are called sort ____.

Answers

The Sort data is the name assigned to the computer tool that is used in the fields to sort the data. It is a data organization utility that is managed in data management and information management within computer data systems.

I need help to make this code to make it remove all instances of the specified letter from the original sentence

Answers

Here is my solution. I did the following:

- changed the setRemover into a constructor, since the comment seems to hint that that is expected.
- changed the lookFor type into a String, so that it can work with the string replace overload. That's convenient if you want to replace with an emtpy string. The char type won't let you do that, you can then only replace one char with another.
- Added a static Main routine to use the class.

import java.lang.System.*;

public class LetterRemover 
{
   private String sentence;
   private String lookFor;

   public LetterRemover() {}
   
   // Constructor
   
   public LetterRemover(String s, char rem)
   {
       sentence = s;
       lookFor = String.valueOf(rem);
   }
   
   public String removeLetters()
   {       
       String cleaned = sentence.replace(lookFor, "");       
       return cleaned;
   }
   
   public String toString()
   {
       return sentence + " - letter to remove " + lookFor;
   }

   public static void main(String[] args) 
   {
        LetterRemover lr = new LetterRemover("This is the tester line.", 'e');
        System.out.println(lr.toString());
        String result = lr.removeLetters();        
        System.out.println("Resulting string: "+result);
   }
}

Other Questions
A child's achievement seems more influenced by _____ in the united states than in other nations. A gym charges a $30 sign-up fee plus $20 per month. You have a $130 gift card for the gym. When does the total spent on your gym membership exceed the amount of your gift card? Which of these nonfiction texts will most likely have a formal tone? Margaret is reading a book. the number of pages she has left to read is 276 - 35d, where d represents the number of days she has been reading. what does each part of the expression represent?(note - not all options may be used)a) the number of pages she has read during 1 weekb) the total number of pages in the book c) the number of pages in the bookd) the number of pages she has read during d days What is business etiquette In a triangle, two of the angles measure 78o and 56o. What is the measure of the third angle? Why do customers have privacy concerns about frequent shopper programs that supermarkets offer, and what can supermarkets do to minimize these concerns? Which is an example of personification? A) "And catch the winds of destiny..." B) "Of restlessness and vague desire--" C) "A boat with a furled sail at rest in the harbor." D) "Ambition called to me, but I dreaded the chances." What is the perimeter of the triangle shown on the coordinate plane, to the nearest tenth of a unit?14.6 units15.5 units21.0 units21.6 units Jay and jim spears own a lawn irrigation system business. they perform installations and maintenance of these systems. several of their customers are golf courses, but they serve a large group of residential customers as well. when they started the business 10 years ago, they made a pact to always operate within the legal limits of the law, but lately, the competition is eating them alive. local competitors have hired illegal immigrants to perform the manual labor. they do not pay taxes on these employees; they just pay them in cash at the end of the week. employment taxes are a burden for small businesses. jay and jim do not want to hire illegal workers. there's a risk if you permit an illegal worker to drive a truck, or if he/she has an accident on the job. you have just studied business ethics in your class. you inform this partnership that: In what ways did the supreme court boost federal power? The primary source of labor for america's first tobacco, indigo and cotton plantations were from: Our solar system is thought to have started with the birth of our Sun, which formed from a cloud of interstellar dust and gas. This cloud condensed and eventually collapsed from its own gravitational pull. The heat and pressure built up, forming a protostar. Eventually nuclear fusion began. Planets formed from remaining dust and gas orbiting the protostar.This explanation best describes _____.the nebular theorythe big bang theorythe inflation theorythe condensation theory The idea that when one's marital partner is chosen by others and the relationship is not based on any preexisting mutual attraction is Nosotros nos despertamos tarde, nos vestimos y (salir) al aeropuerto.A. salimosB. salemosC. saliamosD. salgamos 50 POINTS FOR THE PERSON THAT ANSWERS CORRECTLY!!!!!!! Translate these coordinates 3 units to the right and then rotate 180 around the origin. To what style of art does the painting Liberty Leading the People belong?post-impressionismrealismromanticismpointillism A roller coaster, traveling with an initial speed of 15 meters per second, decelerates uniformly at 7.0 meters per second2 to a full stop. approximately how far does the roller coaster travel during its deceleration? A lollipop factory used 74.75 kilograms of sugar to make 2 batches of lollipops.how much sugar did the factory put in each batch? (Tape diagram) Help me with this question plzzzz Steam Workshop Downloader