Explanation:
Ventajas de las tablas dinámicas de Excel:
Hacen que los informes sean flexibles y se adaptan a tus necesidades. Son una forma interactiva de resumir rápidamente grandes volúmenes de datos, haciendo mucho más fácil el proceso de análisis y permitiendo encontrar patrones o tendencias.
Audience centered public speakers are inherently sensitive to the
Answer:
the diversity of their audiences
Explanation:
A is a distinctive characteristic of a virus or virus family.
Answer:
Assuming your talking about a computer virus(because your under the Computers and Technology section)
Also assuming you meant "What is a distinctive characteristic of a virus or virus family."
A computer virus is a software that was created with the intent of damaging a computer. Computer viruses can replicate them selves by modifying other software on the computer. Viruses such as file infectors can override the machine code of another application and inject its own malicious machine code to perform malicious acts. This is especially dangerous for the OS as the virus can override essential files.
Explanation:
Write an application that allows a user to input the height and width of a rectangle. It should output the area and perimeter of the rectangle. Use methods for entering the values, performing the computations, and displaying the results. Results should be formatted with one position to the right of the decimal and printed number aligned in a tabular display.
Answer:
Explanation:
This code is written in Java. It creates a Rectangle class that contains variables for the height and width. It also contains constructor, methods for calculating perimeter and area, and a printInfo method to print out all the results. A test case has been created in the main method which creates a Rectangle object and prints out the printInfo which calls the area and perimeter methods as well. The output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.
Assume the existence of a Building class. Define a derived class, ApartmentBuilding that contains four (4) data members: an integer named numFloors, an integer named unitsPerFloor, a boolean named hasElevator, and a boolean named hasCentralAir. There is a constructor containing parameters for the initialization of the above variables (in the same order as they appear above). There are also two function: the first, getTotalUnits, accepts no parameters and returns the total number of units in the building; the second, isLuxuryBuilding accepts no parameters and returns true if the building has central air, an elevator and 2 or less units per floor.
Answer:
Explanation:
The following code is written in Java. The class ApartmentBuilding extends the assumed class of Building but does not call any of its methods since we do not have access to it. The ApartmentBuilding class contains all of the variables listed, as well as constructor and methods, including getter and setter methods for each variable. A test case for the class is provided in the image below with it's output.
class ApartmentBuilding extends Building {
int numFloors, unitsPerFloor;
boolean hasElevator, hasCentralAir;
public ApartmentBuilding(int numFloors, int unitsPerFloor, boolean hasElevator, boolean hasCentralAir) {
this.numFloors = numFloors;
this.unitsPerFloor = unitsPerFloor;
this.hasElevator = hasElevator;
this.hasCentralAir = hasCentralAir;
}
public int getTotalUnits() {
int total = this.numFloors * this.unitsPerFloor;
return total;
}
public boolean isLuxuryBuilding() {
if ((this.hasCentralAir == true) && (this.hasElevator == true) && (this.unitsPerFloor <= 2)) {
return true;
} else {
return false;
}
}
public int getNumFloors() {
return numFloors;
}
public void setNumFloors(int numFloors) {
this.numFloors = numFloors;
}
public int getUnitsPerFloor() {
return unitsPerFloor;
}
public void setUnitsPerFloor(int unitsPerFloor) {
this.unitsPerFloor = unitsPerFloor;
}
public boolean isHasElevator() {
return hasElevator;
}
public void setHasElevator(boolean hasElevator) {
this.hasElevator = hasElevator;
}
public boolean isHasCentralAir() {
return hasCentralAir;
}
public void setHasCentralAir(boolean hasCentralAir) {
this.hasCentralAir = hasCentralAir;
}
}
BIOS has two jobs. One is to boot up, or start, the computer. What is the other? Maintain the computer’s software firewall. Ensure the fastest possible Internet speed. Provide the basic interface for the hardware. Perform regularly scheduled memory backups.
Answer:
Provide the basic interface for the hardware.
Explanation:
Hoda needs to create a chart that is associated with an Excel spreadsheet. She needs to ensure that if the data in the spreadsheet changes, the chart in her presentation will be updated. Which option must she choose?
Embed the chart.
Link the chart.
Insert the chart as a picture.
This cannot be done.
Answer:
the awnser is B
Explanation:
Answer:
B, Link the chart.
Explanation:
Select the item that best represents technology transfer?
Newtonian telescope
Magnetic Compass
Printing Press
Answer:
Printing Press
Explanation:
Technology transfer is the simple process of sharing or dissemination of information from person to person (or from one organisation to another)
Therefore, the item that best represents technology transfer from the given answer choices is the printing press.
This is because, the printing press helped to print paper containing information which was sent from one location to another.
cual es el procedimientos para asistir en el transporte publico a personas discapacitadas
Answer:
Una discapacidad física o motora en una o más partes del cuerpo obstaculiza las acciones y / o movimientos de la persona con discapacidad. La discapacidad puede surgir porque las partes del cuerpo no han crecido completamente o están dañadas (anomalías físicas) o porque las funciones físicas están alteradas (anomalías funcionales).
En la mayoría de los casos, se proporciona una ayuda a las personas con discapacidades físicas graves para que puedan desenvolverse más fácilmente en la sociedad. Alguien con una discapacidad motora severa en las piernas a menudo usa una silla de ruedas. Las personas con una discapacidad motora de las manos (pérdida de la motricidad fina) o de los brazos pueden compensar esto con un manipulador o ayudas especializadas en tareas, como un dispositivo para comer o un dispositivo para girar las hojas.
Así, todos estos elementos deben ser posibles de ser insertados en los medios de transporte público como forma de ayudar a estas personas a trasladarse por estos medios, es decir, los autobuses, trenes, etc., deben estar adaptados para poder recibir allí a pasajeros en sillas de ruedas o con necesidades motoras especiales.
On SnapI blocked someone, unblocked them and I want to add them again but I forgot their username. Is there anything I can do? Does snap have a list of like my former friends or people I’ve blocked?
Answer:
There is no list of people you had blocked formerly, however you should have seen their username when unblocking them? That's the only way I can think to find their user. Maybe if you have a friend who knows their username, you can get it that way. Or if you remember just a bit of it or their first/last name, you can try searching that.
A driver that approaches a controlled intersection with a signal that is not working must:
1. Read the following scenario. What type of business letter do you think is required in this situation? (1 point)
Melissa and Melrose are both first-year students at a local community college. They both have interest in volunteering with a nonprofit organization. They decided to reach out to nonprofit organizations to ask about the steps they need to take in order to volunteer.
Answer:
It requires a formal letter.
Answer:
This would require a formal business letter, the type being a cover letter or inquiry.
Explanation: yes
write chracteristics of all 5 generation of computer
Answer:
First generation — 1940–1956
-used vacuum tubes
ENIAC, UNIVAC I, IBM 650, IBM 701 etc.
mainframes taking up entire rooms
punched cards I/O
electrostatic and mercury delay line memory, beginning use of core
Second generation — 1956-1963
-used discrete transistors
IBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.
first appearance of minicomputer (PDP-8)
punched cards I/O and line printers (mainframe), TTY (minicomputers)
core memory, magnetic tape for mass storage
Third generation — 1964-1971
-used integrated circuits
IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.
mostly same I/O and memory as second generation
Fourth generation — 1971-present
-use microprocessors
PDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.
transition from minicomputers to personal computers
video terminals used for I/O, specialty computer printers developed
fewer mainframes
semiconductor memory replaces core memory
hard drives and optical drives replace magnetic tape for mass storage, followed by solid-state drives (SSD)
Fifth generation — (current research)
-artificial intelligence and quantum computing
Answer:
The five generations of computer are characterized by electrical current flowing through the processing mechanisms listed below : The first within vacuum tubes The second within transistors The third within integrated circuits The fourth within microprocessors clips The fifth unveiled smart devices capable of artificial...
Explanation:
☆hope it is helpful to you ☆
☆MiraculousNisha^_^Helllllllllppppppppppp
Answer:
9
Explanation:
"++" at the beginning increases your "x" by 1 before using it.
if it placed after your variable, it will increase it after your program used it.
Which option is used to insert a table in PowerPoint from another Office application?
In the Insert Object dialog box, choose Create from file.
In the Design tab, choose the Table Styles option.
In the Insert Table dialog box, choose Insert Table.
In the Layout tab, choose the Merge option.
Answer: In the Insert Object dialog box, choose Create from file.
Explanation:
To insert a table into PowerPoint from another Office application, go to the Insert Tab. In the Text ribbon on the far right, you will see "Object" next to Equation.
After clicking on that, select the "Create from File" option. It will allow you to browse a file you want to import from. PowerPoint will import the data from this file.
Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I 1 V 5 X 10 L 50 C 100 D 500 M 1,000 Numbers are formed according to the following rules: a. Only numbers 1 to 3,999 (inclusive) are represented. b. As in the decimal system, the thousands, hundreds, tens, and ones are express separately. c. The numbers 1 to 9 are expressed as I 1 II 2 III 3 IV 4 V 5 VI 6 VII 7 VIII 8 IX 9 As
Answer:
Explanation:
#include <stdio.h>
int main(void)
{
int num, rem;
printf("Enter a number: ");
scanf("%d", &num);
printf("Roman numerals: ");
while(num != 0)
{
if (num >= 1000) // 1000 - m
{
printf("m");
num -= 1000;
}
else if (num >= 900) // 900 - cm
{
printf("cm");
num -= 900;
}
else if (num >= 500) // 500 - d
{
printf("d");
num -= 500;
}
else if (num >= 400) // 400 - cd
{
printf("cd");
num -= 400;
}
else if (num >= 100) // 100 - c
{
printf("c");
num -= 100;
}
else if (num >= 90) // 90 - xc
{
printf("xc");
num -= 90;
}
else if (num >= 50) // 50 - l
{
printf("l");
num -= 50;
}
else if (num >= 40) // 40 - xl
{
printf("xl");
num -= 40;
}
else if (num >= 10) // 10 - x
{
printf("x");
num -= 10;
}
else if (num >= 9) // 9 - ix
{
printf("ix");
num -= 9;
}
else if (num >= 5) // 5 - v
{
printf("v");
num -= 5;
}
else if (num >= 4) // 4 - iv
{
printf("iv");
num -= 4;
}
else if (num >= 1) // 1 - i
{
printf("i");
num -= 1;
}
}
return 0;
}
state 4 & circumstances under which warm
booting of a computer may be necessary
Answer:
to close an open application
10 ICTs that encourage reading...?
10 ICTs that encourage reading are given below:-
laptop / desktopprojectorphotocopierprinterIpadswebboardsinteractive white boardmicrophoneTablets Internet .Hope it is helpful to you
Consider the following scenario. As you troubleshoot the problem, what motherboard device would be the first to check? A user reports that his computer fails the POST upon startup. ROM CMOS RAM Power supply Processor
Answer:
The correct answer Power Supply
Explanation:
write a short note about applications of computer
Answer:
Computer is very effective machine which can be used for teaching, learning, online bill payment, watching TV, home tutoring, social media access , playing games, internet access, etc. It also provides us to communicate with our friends and relatives although, they are in corner of world......
ou use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do
Answer:
Enable the Erase data optionDisable the simple passcode optionExplanation:
Most smartphone security experts agree that one way to prevent unauthorized access to one's iPad is to enable the erase data feature. Enabling this feature is believed to allow the possibility of all data on the device to be erased if a wrong passcode is entered after a specified number of times.
Of course, it is also possible to set a complex alphanumeric passcode, however, you'll need to first disable the simple passcode option.
Draw a circuit with a 12-volt battery, a 100 ohms resistor in series, and two resistors (each of value 200 ohms) in parallel. What is the total resistance of the circuit?
Answer:
200 Ω
Explanation:
Hi there!
Please see below for the circuit diagram.
1) Find the total resistance of the resistors in parallel
Total resistance in parallel equation: [tex]\frac{1}{R_T} = \frac{1}{R_1} +\frac{1}{R_2}[/tex]
Both the resistors measure 200 Ω. Plug these into the equation as R₁ and R₂:
[tex]\frac{1}{R_T} = \frac{1}{200} +\frac{1}{200}\\\frac{1}{R_T} = \frac{1}{100}\\R_T=100[/tex]
Therefore, the total resistance of the resistors in parallel is 100 Ω.
2) Find the total resistance of the circuit
Now, to find the total resistance of the circuit, we must add the 100 Ω we just solved for and the 100 Ω for the other resistor placed in series:
100 Ω + 100 Ω = 200 Ω
Therefore, the total resistance of the circuit is 200 Ω.
I hope this helps!
How many characters should a strong password have? four six eight ten
Answer:
I say it have to be aleast 8 to complete a strong password
Explanation:
it's common sense
Answer:
8
Explanation:
The more the better but ten too much
Which tab on the ribbon is used to access the global Access 2016 options?
Home
Create
Database Tools
File
Explanation:
the answer is Database Tools
Select three physical forms of storage. USB drive Primary cache Magnetic storage Secondary cache Dynamic RAM Optical drive
Answer:USB drive
Magnetic storage
Optical drive
Explanation:
hope this helps
Online retailers can and should encourage every customer to sign up for regular emails from the retailer. To avoid spam filters, retailers should Group of answer choices automatically send regular emails to all customers send emails to all customers except those who request to be taken off the email list provide a check box that is checked by default during the checkout process for customers to sign up for emails provide a check box that is unchecked by default during the checkout process for customers to sign up for emails ANS:DPTS:1
Answer:
Provide a check box that is checked by default during the checkout process for customers to sign up for emails
Explanation:
I've seen this used the most so I would go with this answer.
The way online retailers get you is by showing you a prechecked email subscription with an unchecked TOS agreement. Your attention is then focused on the TOS agreement and not the agreement for promotions sent to you via email.
What is binary number system? Why is it used in computer system?
Answer:
Computers depend mainly on binary because it’s more time efficient for them to so.
Explanation:
It’s easier to identify 0 as “off” and 1 as “on”. As you may know, transistors are the fundamental blocks of microprocessors and ICs. The reasons this is the case is that these transistors form logic gates which can carry out basic logic operations. These logic gates are a huge step into making microprocessors/ICs/etc. And what do these logic gates depend on? They depend on binary.
Whoa whoa, wait a minute. Let’s first take a step back to know a thing or two about logic gates.
These logic gate can be constructed from transistors. They carry basic logic operations. You have one or more inputs “entering” the logic gate ——-> A certain operation is performed on them ——-> you get your output. The input is a voltage. This voltage it can be interpreted as an “on” or “off” according to the gate. Once again these offs and ons are 0s and 1s. For example the Inverter/NOT gate is a gate that simply takes an input and gives its inverse. For example:-
A low voltage/an “off” signal/ a “0” “enters” the NOT gate. ——-> A high voltage/an “on” signal/ a “1” is the result of the operation performed
(In the above example low voltage = “off” signal = 0, high voltage = “on” signal = 1)
As you can see, a 0 enters the NOT gate and a 1 comes out or vice versa. Now, if you were a logic gate, you’d prefer working with just 0s and 1s right? I would. This would be much easier to work with than a lot of different values.
It’s a herculean task to work with these though as a human. And fortunately, programming languages exist for giving the computer instructions to do in a “language” other than its own.
if person is male their username is the last 3 letters of their surname and the first 2 letters of their first name if a person is female their username is the first 3 letters of their first name and the last 2 letters of their last name. write an algorithm to output a username (Could you answer in Python pls)
gender = input("What's your gender? (`male` or `female`): ")
firstname = input("What's your firstname?: ")
surname = input("What's your surname?: ")
username = ""
if gender == "male":
username += surname[-3:]
username += firstname[0:2]
elif gender == "female":
username += firstname[0:3]
username += surname[-2:]
print(f'Your username is {username}')
The most likely reason a firm would decide to establish an extranet would be the desire to Multiple Choice speed the flow of information on its private network by increasing the bandwidth. make the information on its network widely available to the general public. share information and collaborate with a select group of outside organizations or individuals. overcome the speed and capacity limitations of its external connection to the Internet by gaining access to the very-high-speed Backbone Network Service.
Answer: share information and collaborate with a select group of outside organizations or individuals.
Explanation:
When a company uses an intranet, it is for the purpose of sharing information within the company so in the same vein, an extranet is done to share information with entities outside the company be it people or organizations.
For information to be shared, the other companies and organizations need to have the means and authorization to join the extranet. Extranets are very useful as they enable collaboration across vast distances thereby increasing productivity.
The most likely reason a firm would decide to establish an extranet is B. share information and collaborate with a select group of outside organizations or individuals.
An extranet simply means a controlled private network that allows customers, vendors, partners, suppliers, etc to gain information about a company.
Extranet is vital to share information and collaborate with a select group of outside organizations or individuals. It is usually a private part of a website.
Read related link on:
https://brainly.com/question/10156285
Modify the statistics program from this chapter so that client programshave more flexibility in computing the mean and/ or standard deviation.Specifically, redesign the library to have the following functions:mean(nums) Returns the mean of numbers in nums.stdDev(nums) Returns the standard deviation of nums.meanStdDev (nums) Returns both the mean and standard deviation of nums.
Answer and Explanation:
Using Javascript:
function mean(nums){
var array_numbers= new array(nums);
var meanofNums= array_numbers.reduce()/array_numbers.length;
Console.log(meanofNums);
}
Function Std(nums){
var OurArray= new Array(nums);
var meanOfnums= mean(nums);
var i;
for(i=0; i<=OurArray.length; i++){
OurArray[i]= OurArray[i]-meanOfnums*OurArray[i]-meanOfnums;
}
var al_stdOfnums= OurArray.reduce()/OurArray.length;
var stdOfnums= Math. sqrt(al_stdOfnums);
Console.log(stdOfnums);
}
function meanStdDev (nums){
mean(nums);
Std(nums);
}
/*From the code above, we have defined functions and used them in the last function definition meanStdDev (nums), making for code reusability. In defining the functions, we have followed the formulas for calculating mean and standard deviations and implemented in that order. Notice how we used a for loop in std(nums) function definition to iterate through the elements of the array nums, squaring each value and reassigning a new value for each element(using index value) in the array. We then added these values in array using reduce method, dividing by array length and square rooting the value using the math object method sqrt().*/
Which unit of computer is used to processed data?
Please help!!!!!!
[tex]Hello[/tex] [tex]There![/tex]
[tex]AnimeVines[/tex] [tex]is[/tex] [tex]here![/tex]
Is it Central Processing Unit?
[tex]HopeThisHelps!![/tex]
[tex]AnimeVines[/tex]
Answer:
Central Processing Unit (CPU)
Explanation:
The Central Processing Unit (aka CPU), is used to process the data.