Hey I need help... Picture below explains everything

Hey I Need Help... Picture Below Explains Everything

Answers

Answer 1

The C program that verifies the numbers that are divisible by 3 is given as follows:

int main(){

int i;

int value;

int numbers;

int multiples_of_three = 0;

int non_multiples_of_three = 0;

printf("How many numbers do you need to check?\n");

scanf("%d", &numbers);

for(i = 0; i < numbers; i++){

printf("Enter number: ");

scanf("%d", &value);

if(value % 3 == 0){

printf("%d is divisible by 3\n", value);

multiples_of_three++;

}

else{

printf("%d is not divisible by 3\n", value);

non_multiples_of_three++;

}

}

printf("You entered %d number(s) that are divisible by 3\n", multiples_of_three);

printf("You entered %d number(s) that are not divisible by 3\n", non_multiples_of_three);

return 0;

}

How to construct the program?

The first step is declaring the main function as is standard for C programs, as follows:

int main(){

return 0;

}

Then the variables are initialized, as follows:

int i; -> counter

int value; -> stores each value.

int numbers; -> stores how many numbers have to be read.

int multiples_of_three = 0; -> counts the number of multiples of 3, starting at 0. (if you don't declare an initial value, then the increment will have undefined behavior).

int non_multiples_of_three = 0; counts the number of non-multiples of 3, starting at 0.

Then the number of values to be read is prompted, as follows:

printf("How many numbers do you need to check?\n");

scanf("%d\n", &numbers);

Then the for loop is used to:

Enter the numbers.Check if they are divisible by 3. (tests if the remainder is zero).Incrementing one of the counters with the if clause.

for(i = 0; i < numbers; i++){

printf("Enter number: ");

scanf("%d\n", &value);

if(value % 3 == 0){

printf("%d is divisible by 3\n", value);

multiples_of_three++;

}

else{

printf("%d is not divisible by 3\n", value);

non_multiples_of_three++;

}

}

Then each of the amounts are printed, as follows:

printf("You entered %d number(s) that are divisible by 3\n", multiples_of_three);

printf("You entered %d number(s) that are not divisible by 3\n", non_multiples_of_three);

More can be learned about divisibility by 3 at https://brainly.com/question/9462805

#SPJ1

Hey I Need Help... Picture Below Explains Everything

Related Questions

When the data can flow across a cable in both directions, this is known as full duplex communication. Explanation: In a duplex type of topology or communication, data or information can be transferred in both directions

Answers

When data can flow across the cable in both directions, this is known as full duplex communication.

What is Duplex Communication?

A point-to-point system with two or more connected parties or equipment that can communicate with one another in both directions is known as a duplex communication system.In many communication networks, duplex systems are used, either to provide a reverse way for the monitoring and remote adjustment of equipment in the field, or to provide simultaneous communication in both directions between two linked parties. Full-duplex (FDX) and half-duplex (HDX) are the two different forms of duplex communication technologies.A full-duplex system allows for simultaneous communication between both sides. Simple telephone service is an illustration of a full-duplex equipment; callers can simultaneously speak and be heard by call recipients on both ends.Neither party may communicate with the other simultaneously in a half-duplex or semi-duplex system; instead, one way at a time is exchanged. Walkie-talkies, which are two-way radios with push-to-talk buttons, are an illustration of a half-duplex gadget.

Correct Question: When data can flow across the cable in both directions this is known as a what communication?

To learn more about Communication from the given link

https://brainly.com/question/25793182

#SPJ4

in blockchain, transaction data is stored in blocks. each block in the blockchain contains , which helps create secure transactions. more than one answer may be selected.

Answers

The blockchain is a chain of data made up of blocks with predetermined storage capacities that, when filled, are closed and connected to the block that came before them.

What are Bitcoin vs. blockchain?

Bitcoin is a form of cash, whereas blockchain is a distributed database. Bitcoin is based on blockchain technology, which has a wide range of uses. Bitcoin promotes anonymity, whereas Blockchain emphasizes transparency.

How does a blockchain operate and what is it?

Blockchain is a data storage technique that makes it challenging or impossible to alter the system, hack it, or cheat. A blockchain is a collection of computer systems that merely copies and distributes a digital record of transactions throughout the entire network.

To know more about Blockchain visit:

https://brainly.com/question/28828415

#SPJ4

After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the network using the same software flaw.
The exploit code is publicly available and has been reported as being used against other industries in the same vertical. Which of the following should the network security manager consult FIRST to determine a priority list for forensic review?
A. The vulnerability scan output
B. The IDS logs
C. The full packet capture data
D. The SIEM alerts

Answers

In order to establish a priority list for forensic analysis, the network security manager should FIRST evaluate the vulnerability scan output.

What part does network security play?

Your network and data are shielded from risks such as attacks and breaches thanks to network security. This is a broad and all-encompassing phrase that refers to software and hardware solutions, procedures, policies, and configurations for network use, accessibility, and overall threat protection.

What qualifications do you require to manage network security?

For work as a cybersecurity manager, many businesses want a four-year bachelor's degree. The degree should be in one of the computer-related fields, such as cybersecurity, computer sciences, or any other field that deals with IT. A significant benefit is also having experience in the pertinent subject.

To know more about network security visit :-

https://brainly.com/question/14407522

#SPJ4

a researcher conducted an experiment in whice he compared two methods of teaching if there were 10 people

Answers

A researcher ran an experiment in which he contrasted two teaching strategies for a class of ten students. then using 10 as a teaching strategy.

What is a good number of people for an experiment?

When utilizing qualitative methods, 30 is more than sufficient and a respectable sample size, but when using quantitative methods and analysis, less than 100 is insufficient for even a basic statistical analysis.

It is fairly simple to differentiate instruction and learning. Giving lessons on a specific subject to a group of students is the simple definition of teaching. Learning, on the other hand, is obtaining knowledge through study, instruction, and experience.

Face-to-face lectures involve students and instructors interacting in real time, which is one of the key contrasts between face-to-face and online training. In contrast, online students study at their own pace, going through lectures and other course materials.

To learn more about teaching method refer to :

https://brainly.com/question/22786034

#SPJ4

True or False: As with the initial development of the system, implemented changes are formally reviewed and not tested before installation into operational systems.

Answers

Before being incorporated into operating systems, implemented changes are formally vetted but not tested, just like during the system's initial development. This claim is untrue.

What exactly does implementation mean?

After implementation, users can take control of the system's operation for use and evaluation. It comprises preparing for a smooth conversion and instructing users on how to utilise the system.

What in T/F software testing is false?

Untrue T/F Preventive maintenance focuses solely on fixing flaws in an existing system without introducing new functionality, giving little to no value to the organisation. Untrue T/F Change-implementation and change-design are not important maintenance tasks.

To learn more about system implementation visit:

brainly.com/question/14274204

#SPJ4

bob is a member of the accounting group. the accounting group has been granted the read and write ntfs permissions for the weeklyreport.xls file. bob is also a member of the everyone group, which has been given the full control permission for the weeklyreport.xls file. which of the following statements most correctly describes bob's ability to access the weeklyreport.xls file?

Answers

Bob is able to open, read, and modify the file is most correctly describes bob's ability to access the weeklyreport.xls file.

Which Windows 10 application would you use to view every network and shared folder?

If you're using Windows 10 or 8.1, File Explorer or Windows Explorer, respectively, is the easiest way to view the shared folders in Windows. If you're using Windows 7, Windows Explorer is the best option. Open it, expand the Network area on the left side of the window, and then choose the name of your Windows PC by clicking or tapping on it.

which effective Excel tool is used for calculations summarize and analyze data to identify trends and patterns?

You may compare, summarize, and analyze data using a pivot table, which is a strong tool that enables you to spot patterns and trends in your data.

To know more about ntfs permissions visit :-

https://brainly.com/question/29563581

#SPJ4


• Evaluate apps in three categories of your choice, using criteria you have developed to identify the qualities sought in an effective
app. Make sure your rating scale is appropriate and clear.
. Write three tech advice columns of at least 150 words each, reviewing each of the apps.
Develop a three- to five-minute demonstration of at least one of the apps.

Answers

Had to attach as file Due to brainly freaking out.

I would quit if I saw this

design a class named persondata with the following member variables: lastname firstname address city state zip phone write the appropriate accessor and mutator functions for these member variables. next, design a class named customerdata, which is derived from the persondata class. the customerdata class should have the following member variables: customernumber mailinglist the customernumber variable will be used to hold a unique integer for each customer. the mailinglist variable should be a bool. it will be set to true if the customer wishes to be on a mailing list, or false if the customer does not wish to be on a mail- ing list. write appropriate accessor and mutator functions for these member variables. demonstrate an object of the customerdata class in a simple program.

Answers

Using the knowledge in computational language in C++ it is possible to write a code that design a class named persondata with the following member variables

Writting the code:

#include <iostream>

using namespace std;

class PersonData

{

private:

string lastName,firstName, address, city, state,zip, phone;

public:

//set and get methods

void setLastName(string lastName)

{

this->lastName = lastName;

}

string getLastName()

{

return lastName;

}

void setFirstName(string firstName)

{

this->firstName = firstName;

}

string getFirstName()

{

return firstName;

}

void setAddress(string address)

{

this->address = address;

}

string getAddress()

{

return address;

}

void setCity(string city)

{

this->city = city;

}

string getCity()

{

return city;

}

void setState(string state)

{

this->state = state;

}

string getState()

{

return state;

}

void setZip(string zip)

{

this->zip = zip;

}

string getZip()

{

return zip;

}

void setPhone(string phone)

{

this->phone = phone;

}

string getPhone()

{

return phone;

}

};

class CustomerData : public PersonData

{

private:

int customerNumber;

bool mailingList;

public:

//set and get methods

void setCustomerNumber(int customerNumber)

{

this->customerNumber = customerNumber;

}

int getCustomerNumber()

{

return customerNumber;

}

void setMailingList(bool mailingList)

{

this->mailingList = mailingList;

}

int getMailingList()

{

return mailingList;

}

};

int main() {

CustomerData cust;

cust.setCustomerNumber(1007);

cust.setMailingList(true);

cust.setLastName("Jones");

cust.setFirstName("Emily");

cust.setAddress("7764,Hillside");

cust.setCity("Trenton");

cust.setState("NJ");

cust.setZip("08625-0088");

cust.setPhone("768-687878");

cout<<"Customer Number : "<<cust.getCustomerNumber();

cout<<"\nName : "<<cust.getFirstName()<<" "<<cust.getLastName();

cout<<"\nAddress : "<<cust.getAddress()<<","<<cust.getCity()<<","<<cust.getState()<<" "<<cust.getZip();

cout<<"\nPhone : "<<cust.getPhone();

return 0;

}

See more about C++ at brainly.com/question/18502436

#SPJ1

The Python "SyntaxError: leading zeros in decimal integer literals are not permitted" occurs when we declare an integer with leading zeros. To solve the error, remove any leading zeros from the integer or wrap the value in a string.

Answers

To remove the error, one way is to remove any leading zeros from the integer and other way is to wrap the value in a string.

How to remove any leading zeros?

lets take an example

SyntaxError: leading zeros in decimal integer literals are not permitted; use an ∅o prefix for octal integers

my_num = 08

my_num = 8

print(my_num) # ️ 8

How to wrap the value in a string?

lets take an example

SyntaxError: leading zeros in decimal integer literals are not permitted; use an ∅o prefix for octal integers

my_num = 08

my_num = '08'

print(my_num) # ️ '08'

to know more about Syntax Error, visit

https://brainly.com/question/29883846

#SPJ4

Your organization allows employees to bring their own devices into work, but management is concerned that a malicious internal user could use a mobile device to conduct an insider attack.
Which of the following should be implemented to help mitigate this threat?

Answers

Create an AUP that outlines the locations and times that mobile devices are permitted to be used inside the company.

What should be in an AUP?

An acceptable usage guideline typically: includes explicit guidelines, like no video piracy. explains the repercussions of breaching the rules, such as warnings or access suspension. Describes how access is granted by an organization (for example, internet use is a privilege that can be revoked, rather than a right)

AUPs lower risk in what ways?

By restricting employee access to specific websites, an AUP can help lessen your business' vulnerability to cyberattacks. However, if your rules are overly stringent, it may have a negative impact on employee satisfaction, which may then have a negative impact on productivity and retention.

To know more about AUP visit:

https://brainly.com/question/2912406

#SPJ4

select the statement which best describes the application of observation and analysis procedures when troubleshooting complex circuits.

Answers

Troubleshooting controlling circuits, Consider looking into the signs, Test potential causes after identifying the likely ones.

How critical are protocols for debugging electrical circuits?Due to the possibility of further underlying issues, this is crucial. An fault with a circuit, for instance, can result in a fuse blowing (such as a shorted electrical connection). If so, extra troubleshooting will be necessary. Troubleshooting controlling circuits, Consider looking into the signs, Test potential causes after identifying the likely ones.Correct the issue, keep an eye on the process, identify the underlying reason, and complete any necessary paperwork as a result of your actions.As part of the circuit analysis process, each component of the circuit under consideration has its current and voltage determined. By presenting novel circuit analysis approaches, this chapter expands the repertoire of circuit-solving tools. These techniques are superposition, Thévenin's, Norton's, Mesh, and Nodal methods.      

To learn more about Troubleshooting refer to:

https://brainly.com/question/14394407

#SPJ4

The Ntuser.dat file loads registry information for the current user logged onto a system in the HKEY_CURRENT_USER (HKCU) registry hive. True or False?

Answers

Yes, The Ntuser.dat file loads registry information for the current user logged onto a system in the HKEY_CURRENT_USER (HKCU) registry hive.

Where can I get the Ntuser DAT file?

NTUSER. DAT can be found under C:usersdefaultntuser. dat in Windows Vista and later versions of Windows. Other paths exist for earlier operating systems, such as C: Documents and Settingsusername>ntuser.

What causes a Windows 10 user profile to become corrupt?

One of the following factors is known to contribute to this error: The user profile is damaged or not present. Virus attacks, power outages, and disk write mistakes all jeopardize the integrity of the file system. faulty memory or a failing hard drive are examples of hardware issues.

To know more about operating system visit:

https://brainly.com/question/6689423

#SPJ4

a _____ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.

Answers

A security incursion is a security event that results in a security incident in which an unauthorized user gains access to a system.

What are an intruder and an intrusion?

Attackers who try to compromise a network's security are known as intruders. They launch an attack on the network to gain illegal access. There are three different categories of intruders: miscreants, masqueraders, and covert users.

What is in charge of figuring out whether an intrusion has happened?

The analyzer is in charge of figuring out whether an intrusion has taken place. This component's output serves as a notification of an intrusion. An IDS's user interface enables a user to monitor system output or modify the system's behavior.

To know more about security visit:-

https://brainly.com/question/28070333

#SPJ4

When two adjacent 1-pixel-wide borders are collapsed together, the width of the resulting border is _____.
2-pixels
1-pixels
​4-pixels
​0.5-pixel

Answers

When two adjacent 1-pixel-wide borders are collapsed together, the width of the resulting border is 2 pixels.

In CSS (Cascading Style Sheets), the border-width property specifies the width of an element's borders. When multiple borders are applied to the same element, the borders are placed on top of each other and the width of the resulting border is the sum of the individual border widths.

For example, if two adjacent borders are each 1 pixel wide, the resulting border will be 2 pixels wide. If the borders have different widths, the width of the resulting border will be the maximum of the individual border widths.

) write a binary search function (using recursion) int binary search(int val, int * a, int first, int last); which searches the values in the sorted array a[] from a[first] to a[last] to find an array element with value val. if it finds val, it returns the position of val in a[]. otherwise it returns -1. for example, given the array a[]

Answers

#include <iostream>

#include <algorithm>

int binarySearch(int val, int *a, int first, int last) {

   if (first>last) return -1;

   int mid = first+(last-first)/2;

   if (a[mid]==val) return mid;

   // recursive

   if (val<a[mid]) return binarySearch(val,a,first,mid-1);

   else return binarySearch(val,a,mid+1,last);

}

int main(int argc, char* argv[]) {

   

   int n; std::cin>>n;

   int array[n];

   for(int i=0;i<n;i++) {

       std::cin>>array[i];

   }

   

   //Which value?

   int v; std::cin>>v;

   

   //Sort before sending the function.

   std::sort(array, array+n);

   std::cout << "Position: " << binarySearch(v,array,0,n) << std::endl;;

   return 0;

}

When evaluating a programming language the category Reusability describes:

Answers

This idea explores how tightly bound a language is to a specific platform, how readily code can be disseminated, and how easily libraries can be created and shared.

What notation does Prolog use for expressing arithmetic operations?

One illustration was the nomenclature for arithmetic operators. Prolog will internally use the syntax is(11,+(2,*(3,3))) although we may also write 11 is 2 + 3 * 3. Infix operators are used to describe such functors that can be written between their arguments.

What aspect of contemporary programming language design is widely viewed as being more crucial?

Readability− The readability and comprehension of the programs is a key criterion for evaluating a programming language. Therefore, readability in the context of the issue domain must be taken into account in a decent programming language.

Learn more about programming here:

https://brainly.com/question/11023419

#SPJ4

What list will be referenced by the variable list_strip after the following code executes?

Answers

The list referenced by the variable list_strip after the code executes will be [1, 2, 3, 4], as list_strip was created as a copy of list_org, with list_org.copy(), and then the last element of the list was removed with list_strip.pop().

What is code executes?

Code executes instructions written in a programming language to perform a specific task or set of tasks. It is the process that carries out the instructions in a computer program. Code is written in a programming language, such as C++, Java, or  Python, by a programmer using a text editor or other development environment. The code is then compiled into a format that is executable by the computer, and then executed, or run, to perform the desired tasks.

list_org = [1, 2, 3, 4, 5]
list_strip = list_org.copy()
list_strip.pop()
The list referenced by the variable list_strip after the code executes will be [1, 2, 3, 4], as list_strip was created as a copy of list_org, with list_org.copy(), and then the last element of the list was removed with list_strip.pop().

To learn more about code executes
https://brainly.com/question/28224061
#SPJ4

_____ are standard settings that control how the screen is set up and how a document looks when you first start typing. Tap the card to flip.

Answers

Default settings are the preset options that determine how a computer screen is configured and how a document appears when you first start typing.

A word processing program is what?

A sort of software called "word processing" can be characterized as one that is created and built to allow its end users to enter text and save it in various formats, including:

Standard settings in computer technology refer to the default configurations that determine how a computer screen is set up and how a document appears when you first begin typing on a word processing program.

Read more on word processing here:

brainly.com/question/24043728

#SPJ4

A ________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity

Answers

A network intrusion detection system (NIDS) monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity. NIDS are designed to detect and alert on potential security threats or anomalies that may indicate a breach or attack on a network.

A network intrusion detection system (NIDS) is a type of security software designed to monitor a network for malicious activity or policy violations. NIDSs operate by analyzing network traffic and comparing it against a set of rules or criteria to identify potentially malicious activity.

NIDSs can be configured to monitor specific protocols, ports, or traffic patterns and to alert administrators when suspicious activity is detected. They can also be configured to take automatic action in response to certain types of activity, such as blocking traffic from a particular IP address or triggering a system lockdown.

Learn more about NIDS, here https://brainly.com/question/20556615

#SPJ4

networking essentials (version 2) - modules 1 - 4: internet connection: getting online pre-test exam

Answers

The characteristic of a SOHO network is option D: It is a small network that connects a few computers to each other and to the internet.

What does SOHO stand for?

The SOHO network, also known as a single office, tiny office, or home office network, primarily refers to a business category with a few employees, typically between one and ten. It is a particular local area network connection, or LAN, designed for usage in small enterprises.

Therefore, based on the above, one can say that  SOHO network enables PCs in a home office or remote office to access centralized, shared services or connect to a corporate network.

Learn more about SOHO network  from

https://brainly.com/question/10674980
#SPJ1

See full question below

networking essentials (version 2) - modules 1 - 4: internet connection: getting online pre-test exam

What is a characteristic of a SOHO network?

It consists of multiple LANs with backbone infrastructure connections.

It is a large network, such as those used by corporations and schools, with hundreds or thousands of interconnected hosts.

It is a collection of interconnected private and public networks.

It is a small network that connects a few computers to each other and to the internet.

True or False? In order for the contents of an included file to be treated as html, it must be use the .html file extension

Answers

False. In order for the contents of an included file to be treated as HTML, it does not necessarily need to use the .html file extension.

Question 8 of 10 What is one advantage of replacing a network's copper wires with fiber optic cables? A. It allows more LANs to be connected to the same WAN. B. It saves money because the cables are less expensive. OC. It enables multiple network devices to share a single IP address. OD. It provides the network with more bandwidth.​

Answers

One advantage of replacing a network's copper wires with fiber optic cables is option D. It provides the network with more bandwidth.​

What is the purpose of fiber optic cable?

For long-distance and high-performance data networking, fiber optics are utilized. Additionally, it is frequently utilized in telecommunications services like internet, television, and telephones.

They are known to be used to transmit data signals in the form of light and travel hundreds of miles far more quickly than those used in conventional electrical cables. Optic cables and optical fiber cables are other names for them.

Therefore, Fiber optic cables provide advantages over copper cables. expanded bandwidth. Copper cables have a constrained bandwidth because they were first made for voice transmission. Faster speeds, greater distances, improved dependability, thicker and more durable construction, increased future flexibility, and lower total cost of ownership are some of the benefits.

Learn more about fiber optic cables from

https://brainly.com/question/116766
#SPJ1

T/F BEFORE means before the changes are made in memory but after the changes are permanently saved to disk

Answers

False indicates after the modifications have been permanently saved to disc but before the changes are made in memory.

What is COMMIT?  

The transactional command used to save database changes triggered by a transaction is called COMMIT. All database transactions that have occurred since the last ROLLBACK or COMMIT command are saved when you use the COMMIT command. If you haven't used the COMMIT command, you can use the ROLLBACK command to recover a table's values. By specifying the required fields and putting constraints on the rows to be included in the output, you can choose only a portion of the contents of the table. a cursor attribute that may be added to a cursor or cursor variable's name.

To learn more about ROLLBACK from given link

brainly.com/question/29853510

#SPJ4

Which is NOT a valid sparkline type?
O line
O column
Owin/loss
O bar

Answers

Answer: bar
Bar is not a valid sparkling type

Roughly half of major companies in the U.S. sometimes monitor the email or voicemail of their employees on company systems.True

Answers

True, a majority of significant American businesses occasionally check their employees' voicemails and emails on company networks.

Is an employee's house a place where they work for a business that has computers?

Working for an employer while seated at a desk with a computer at home is the most typical definition of telecommuting.

My personal email is accessible to my employer?

Practically, it all comes down to how your business monitors and tracks its computer system and whether it has the capability to view your personal correspondence. You can almost certainly count on your employer having access to those messages, though.

To know more about employees visit:-

https://brainly.com/question/13405418

#SPJ4

________ is a secure method of encoding data such that it can only be read by having an access key or password to decipher the code.
a. Authentication
b. Verification
c. Keylogging
d. Encryption

Answers

Encryption is the process of securely encoding data so that only authorized users with a key or password can decrypt it to expose the original.

What happens to your data after it has been encrypted? Encryption is the process of securely encoding data so that only authorized users with a key or password can decrypt it to expose the original.When data needs to be safeguarded, encryption is utilized so that individuals who do not have the decryption keys cannot access the original data.Data encryption converts data into another form, or code, that can only be read by persons who have access to a secret key (officially known as a decryption key) or password.Unencrypted data is known as plaintext, whereas encrypted data is known as ciphertext.Data encryption is the process of converting data from a readable plaintext format to an unreadable encoded format known as ciphertext.Users and processes can only read and process decrypted data.Because the decryption key is private, it must be safeguarded from unwanted access.

To learn more about Encryption refer

https://brainly.com/question/29898275

#SPJ4

What is the output?

>>>import time
>>>time.localtime()

the number of seconds since the epoch

the date

the time

the user's time zone

the time-zone offset

Answers

The output from the given function include the following;

A. the number of seconds since the epoch.

B. the date.

C. the time.

What is a function?

In Computer technology, a function can be defined as a named portion of a block of executable code that is written to perform a specific task and output a specific information (result), which is usually a single, related action.

This ultimately implies that, a function comprises a group of related statements (block of code) that would only run and returns a data when it is called.

In this scenario, the given time() function would output the following information:

The number of seconds since or after the epochThe date (day of the year or the month).The time.

Read more on output here: https://brainly.com/question/23462518

#SPJ1

answer key and retrieve the spreadsheet from guided practice: spreadsheet formatting in cell b8, enter a formula to add the quantities of each item in cell a10, key and indent discount in bold font

Answers

The formula to add the quantities of each item in cell

What is formula?

Formula is a set of instructions that expresses a relationship between different values, variables, or numbers. It is used in mathematics, physics, chemistry, economics, and other sciences to calculate an answer from given data. Formulas are made up of symbols and numbers and can be used to solve complex problems or equations. Formulas are also used in everyday life, such as when calculating taxes, measuring ingredients for a recipe, or making financial decisions. Formulas help to make calculations easier and more accurate.

In cell B8, enter the formula “=SUM(A2:A7)” to add the quantities of each item in cell A10. To key and indent the discount, highlight the discount cell and select the bold font option.

To learn more about formula
https://brainly.com/question/29779294
#SPJ1

The default view that PowerPoint opens in is called ____ view.
a. Slide
b. Normal
c. Standard
d. Edit

Answers

Correct answer:- (b) Normal

The default view that PowerPoint opens in is called the normal view.

What is a default view sometimes known as?

The Normal view in PowerPoint is the default view. The normal view is the one in which we may format, add slides, and modify.

Which slide in PowerPoint is the default?

When you create a new presentation, by default, a Title slide will be added since Micro-soft believes that the first slide in your presentation should be for the title. Two text boxes can be included on a title slide.

What makes it a default?

When a borrower ceases making the required payments on a loan, a default happens. Whether the debt is secured, like a mortgage secured by real estate, or unsecured, like credit cards or student loans, defaults can happen.

To know more about power point visit:

https://brainly.com/question/23714390

#SPJ4

task paneA __________ is a window that can remain open and visible while you work in the document.

Answers

A window that can stay open as well as visible while you collaborate in the document is known as a task pane.

What is document?

Document is a written, typed, or printed record of something such as a contract, agreement, or other legal document. Documents can be stored in a variety of formats, including paper, digital, and audio. Documents are used to provide evidence and information, and can be used to establish the identity of a person or to prove a legal claim. Documents can also be used to record transactions, store information, and communicate information. Documents are important resources for businesses, government agencies, and individuals. They are an essential part of the way we conduct business, as they are integral to the exchange of information. Documents can also help protect organizations and individuals in the event of a dispute or legal action.

To learn more about document
https://brainly.com/question/30005386
#SPJ4

Other Questions
trial-and-error learning is based on the idea that learning often occurs by . noticing the consequences of our actions to guide future behavior analyzing and understanding problems watching as another person is reinforced or punished for their behavior random behavior that is immediately forgotten what is relative abundance isotopes A drug that inhibits mitosis, such as griseofulvin or an azole, would be more effective against:a. gram-positive bacteriab. gram-negative bacteriac. fungid. wall-less bacteriae. mycobacteria The Breezy Fan reported a decrease to net income in their income taxes payable account on the statement of cash flows using the indirect method. This means that Breezy Fan's income taxes payable account (increased/decreased) for the period.Blank 1: decreased A classic counting problem is to determine the number of different ways that the letters of "magically can be arranged. Find that number. The number of different ways that the letters of magically" can be arranged is Simplify your answer.) One of the most important concepts in marketing is the price elasticity of demand, which is theA. degree to which the price of a product affects consumers' purchasing behavior.B. point at which the costs of producing a product equal the revenue made from selling the product.C. price that consumers consider reasonable and fair for a product.D. percentage a product is marked up in response to consumer demand.E. percentage change in quantity demanded in response to a percentage change in price.Answer: E how is Christmas and the diffusion of those who celebrate Christmas a direct reflection of colonialism? how does Christmas represent assimilation? a _____ program is one for which the recipient qualifies on the basis of _____. group of answer choices means-tested; age social insurance; need means-tested; income social insurance; income Bashar drew a regular pentagon with sides that are 5 inches long. Then he drew a pentagon with sides that are half the length of the first pentagon's sides. What is the length of the sides of the second pentagon? ecall that one of the ten parts of the definition of a vector space says that if is a vector space, then there exists a vector in such that for all in hceggg we would like to determine whether the standard deviation on monthly rents for one-bedroom apartments is smaller than you are talking a lot about what a terrible class you are taking, but you suddenly stop talking about how terrible the class is when the professor walks into the room. this is an example of suppose a sample of a radioactive substance weighs 32 mg. one year later, the sample weighs 25.5 mg. what is the half-life of this substance? (round your answer to two decimal places.) functional/professional touch is the most highly dictated, generally by implicit cultural rules. true what are the arguments that support businesses moving toward a sustainable future? (check all that apply.) If anyone can help me out that will be great! 3 tyy*brainliest + 50 points* (03.03 MC)The diagram below shows two waves. At which letter (A-D) on the diagram is constructiveinterference going to occur?abcd Fill in the blank with the correct imperfect conjugation of the verb in parentheses. a gloria le ____________ el verano. (gustar) gustaron gustamos gustaba gustbamos when a firm's average total cost curve continually declines, the firm is a group of answer choices revenue monopoly. all of the above are correct. government-created monopoly. natural monopoly. bipedalism is one of the most important characteristics of hominin evolution. the appearance of bipedalism led to anatomical changes that are considered to be distinguishing characteristics of hominin fossils. the evidence for bipedalism is supported by fossil evidence from more than 4 million years ago and 3.6-million-year-old footprints in volcanic ash. recently, however, scientists have focused on the link between tooth structure and diet in the evolution of the early hominins, specifically in australopithecus species. detailed studies of hominin dental features have provided evidence of an important dietary shift that led to adaptive radiation within this genus. most of the evidence comes from analyses of tooth size and shape, microscopic wear patterns on teeth, and jaw structure. the evidence suggests that fibrous plant materials became more important through the pliocene, perhaps as critical components in the diet of some species. what is the most likely evolutionary link between bipedalism and changes in the diet of early hominids?