Figure 3 is a Microsoft Excel Worksheet....
Figure 3 is a Microsoft Excel Worksheet. Use it to answer questions 20 and 21.
A | B | C | D | E | |
1 | IDENTICATION NUMBER | BASIC SALARY (N) | TOTAL ALLOWANCE (N) | TOTAL DEDUCTION (N) |
NET SALARY (N) |
2 | WASC/LPT/001 | 800000 | 60000 | 40000 | 820000 |
3 | WASC/LPT/002 | 700000 | 40000 | 20000 | 720000 |
4 | WASC/LPT/003 | 300000 | 10000 | 5000 | 305000 |
5 | WASC/LPT/004 | 400000 | 20000 | 10000 | 410000 |
Figure 3
What formula will correctly display the total number of individuals involved in the computation as shown in Figure 3?
COUNT(A2:A5)
COUNTIF(A2:A5)
COUNTA(A2:A5)
SUM(A2:A5)
Correct answer is C
The formula that will correctly display the total number of individuals involved in the computation as shown in Figure 3 is COUNTA(A2:A5).
The COUNTA function counts the number of cells that are not empty in a range. In this case, we want to count the number of cells in the A column that are not empty. The A column contains the identification numbers of the individuals involved in the computation. Therefore, the COUNTA function will return the total number of individuals involved in the computation.
The other formulas mentioned are:
COUNT: This function counts the number of cells that contain numbers in a range.
COUNTIF: This function counts the number of cells that contain a specific value in a range.
SUM: This function sums the values in a range.
In this case, we do not want to count the number of cells that contain numbers or the number of cells that contain a specific value. We want to count the number of cells that are not empty. Therefore, the COUNTA function is the most appropriate function to use.
Which of the following file organization requires a primary key? ...
At what stage in data processing does data manipulation take place? ...
The rules for exchanging data on a network are known as ...
The prevention of data from corruption and unauthorized access is a function of data ...
When choosing a file organization method a system administrator will not consider ...
Arranging records in a file according to a particular order is referred to as ...
Computer virus cannot be transmitted by ...
Which of these devices does not support wireless communication? ...