Answers

Answer 1

Answer:

1-simple table

2-excel table

3-pivot table


Related Questions

Select each procedure that will keep the computer safe and working properly. the correct answers are A, D, E
i just took it!


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.
Select each procedure that will keep the computer safe and working properly.


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.

Answers

Answer

Wash your hands thoroughly before using the computer.

Gently type on the keyboard.

Set your water bottle on a table that is away from hardware.

Explanation:

Tables should be used when (a) the reader need not refer to specific numerical values. (b) the reader need not make precise comparisons between different values and not just relative comparisons. (c) the values being displayed have different units or very different magnitudes. (d) the reader need not differentiate the columns and rows.

Answers

Answer: (c) the values being displayed have different units or very different magnitudes

Explanation:

A table is refered to as an arrangement of data in rows and columns. Tables are used in research, communication, and data analysis.

Tables are used in the organization of data which are too complicated or detailed to describe and the use of table give a clearer description. Tables should be used when the values being displayed have different units or very different magnitudes. Tables can also be used in highlighting patterns or trends.

PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!

can someone help me please?

Answers

Answer:

see below picture

Explanation:

You can work your way through the formula from the inside out, mapping every operation to a gate.

Write a program to input the TotalCost and display the Assured gift as per the following criteria TotalCost(TC) Assured Gift Less than or up to 2000 Wall Clock 32001 to 5000 School Bag 5001 to 10,000 Electric Iron More than 10,000 Wrist Watch​

Answers

Answer:

The program in Python is as follows:

TotalCost = int(input("Total cost: "))

if TotalCost <= 2000:

   print("Wall Clock")

elif TotalCost >= 2001 and TotalCost <= 5000:

   print("School Bag")

elif TotalCost >= 5001 and TotalCost <= 10000:

   print("Electric Iron")

else:

   print("Wrist Watch")

Explanation:

This gets input for total cost

TotalCost = int(input("Total cost: "))

If the total cost is up to 2000, print wall clock as the assured gift

if TotalCost <= 2000:

   print("Wall Clock")

If the total cost is between 2001 and 5000 (inclusive), print school bag as the assured gift

elif TotalCost >= 2001 and TotalCost <= 5000:

   print("School Bag")

If the total cost is between 5001 and 10000 (inclusive), print electric iron as the assured gift

elif TotalCost >= 5001 and TotalCost <= 10000:

   print("Electric Iron")

If the total cost is more than 10000, print wrist watch as the assured gift

else:

   print("Wrist Watch")

Prolog uses ____. Select one: a. lowercase for variable names, and uppercase for constants and functions b. uppercase for variable names, and lowercase for constants and functions c. lowercase for variable names and constants, and uppercase for functions d. uppercase for variable names and constants, and lowercase for functions

Answers

Answer:

b) uppercase for variable names, and lowercase for constants and functions  

Explanation:

Given

Programming language: prolog

Required

The case type for variables, constants and functions

In prolog,

Variable names begin with uppercase

e.g. Name, NAME

While constants and functions begin with lowercase

e.g. name, addnumbers()

Hence, (b) is correct

(e) Give the output of the following:
String n="Computer Knowledge";
String m = "Computer Applications";
System.out.println(n.substring(0,8).concat(m.substring(9)));​

Answers

Answer:

Computer Applications

true

Answer:

Computer Applications

Explanation:

true

Assume there are two variables, k and m, each already assigned a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of pertect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square ot another integer (in this case 393, 4*4, 5*5, 6*6 respectively). Assign the number you compute to the variable q. For example, if k and m nad the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36.

Answers

Answer:

Lets us take k, m = 10, 40

q = 0

i = k

while i <= m:

   if int(i*0.5)*2 == i:

       q += 1

   i += 1

Computers work on the garbage-in, garbage-out concept. Comment

Answers

Stands for "Garbage In, Garbage Out." GIGO is a computer science acronym that implies bad input will result in bad output.

Because computers operate using strict logic, invalid input may produce unrecognizable output, or "garbage." For example, if a program asks for an integer and you enter a string, you may get an unexpected result. Similarly, if you try to open a binary file in a text editor, it may display unreadable content.

GIGO is a universal computer science concept, but it only applies to programs that process invalid data. Good programming practice dictates that functions should check for valid input before processing it. A well-written program will avoid producing garbage by not accepting it in the first place. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

NOTE: Because the related terms FIFO and LIFO are pronounced with a long "i," GIGO is typically pronounced "guy-go" (not gih-go). This also helps avoid confusion with the prefix "giga," which is pronounced with a soft "i."

You install Windows 10 on a new computer. You update the video card driver and restart the computer. When you start the computer, the screen flickers and then goes blank. You restart the computer and receive the same result. You need to configure the video card driver. What should you do first

Answers

First, you need to cut off power to the PSUHit the switch on the back of the PC to turn off supply to the PSU. Extract the side panel (usually held on by two screws on the rear)If you do not already have a GPU installed, skip to Step 7.

3. Remove the screws holding the GPU in on the rear bracket. ...

4. Unlock the PCI-e slot clip.

5. Remove the GPU by lightly pulling on the card.

6. Hover the GPU over PCI-e slot.

7. Push down on the GPU to slide the connector into the slot.

8. Ensure the secure lock clicks into place.

9. Screw the rear bracket down to secure the card to the chassis.

10. Connect any required PSU cables.

11. Reattach the side panel,

Now, all you need to do is to plug in the display connectors on the rear of the case, whether they're DisplayPort, HDMI, DVI, or VGA. After that, hit the PSU power switch and boot up Windows. If the PC does not turn on or no signals get sent to the monitor, we'll need to double-check that all cables are connected correctly (both inside and on the rear of the PC), and the GPU is seated properly in the PCIe slot.

who is the father of computer



Answers

Answer:

Charles Babbage is the father of computer

Explanation:

Charles Babbage is know as father of computer.

hope this help!

list out the memory components used by different generation of computer​

Answers

Answer:

here's your answer mate!

1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...

1956 – 1963: Second Generation – Transistors. ...

1964 – 1971: Third Generation – Integrated Circuits. ...

1972 – 2010: Fourth Generation – Microprocessors.

Explanation:

1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...

1956 – 1963: Second Generation – Transistors. ...

1964 – 1971: Third Generation – Integrated Circuits. ...

1972 – 2010: Fourth Generation – Microprocessors.

write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this

Answers

Answer:

The algorithm is as follows:

1. Start

2. bottles = 0

3. While bottles != 500

  3.1 Create bottle

  3.2 bottle = bottle + 1

4. Switch off machine

5. Stop

See attachment for flowchart

Explanation:

This begins the algorithm

1. Start

This initializes bottles to 0

2. bottles = 0

The loop is repeated until 500 bottles is created

3. While bottles != 500

This creates a new bottle

  3.1 Create bottle

This increments the number of bottles by 1

  3.2 bottle = bottle + 1

This switches of the machine after all bottles are created

4. Switch off machine

End algorithm

5. Stop

How computer is important in our life​

Answers

Answer:

Computers are important in our lifes to keep us safe if theres a hurricane tornado or even a blizzard.

Another reason there important is so we can stay in contact with are family

and friends incase of an emergency.

Lastly there important because they can help us get to a place or destination

by using a gps.

Hope it helps✌✌

Answer:

computer is important because we can use it for playing games. watching videos listen music etcetera

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions

Answers

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

https://brainly.com/question/4952591

PLEASE ANSWER ASAP

Type the correct answer in the box. Spell all words correctly.
What was the name of the database that Tim Berners-Lee built?
Tim Berners-Lee built a database called [BLANK].

Answers

Answer:

ENQUIRE database.

Explanation:

I am not sure but I guess this is the answer.

You are the IT Director for Stormwind training studios. Your company has decided to start using Microsoft Intune for all of their software deployments. You want to set up a notification system so that you see all alerts and your IT Manager only gets notified for Critical alerts. How do you accomplish this

Answers

Answer:

Well, if the IT Manager gets only critical alerts on a phone, then the IT Manager has to go to settings and make sure to have all alerts on.  

Explanation:

The IT Manager, probably has his notifications, critical alerts, on only. So the IT Manager should have his notifications to ALL. Where he will be able to see all of the alerts.

It is the way to convey a message,an idea,a picture,or speech that is received and understood clearly and correctly by the person for whom it is sent.​

Answers

Answer:

Communication.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

In this context, communication is the way to convey a message, an idea, a picture, or speech that is received and understood clearly and correctly by the person for whom it is sent.​

Generally, the linear model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.

How should you behave in an online academic environment?

Answers

Answer:

as u want lol

I think it's funny

Answer:

Maintain discipline

Ask questions

Try not to crack jokes

dress smartly

be friendly

don't underestimate anyone each person have their own unique skills

List 10 different products made from timber

Answers

Answer:

Bath towels.

Toothpaste.

Nail polish.

Makeup.

Disinfecting wipes.

Medications.

Paints.

LCD screens.

Houses

Buildings

Explanation:

What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations

Answers

Answer:

This is a pretty obvious answer.

An unwanted e-mail sent in bulk from people or organizations.

Explanation:

The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working.

Which of the following is the MOST likely reason the mouse isn't working?

A. The USB mouse driver is too old for the current mouse.
B. The USB mouse is not a wireless mouse and needs to be plugged into the computer.
C. The USB mouse is malfunctioning.
D. The USB mouse receiver is not plugged into the computer.

Answers

Answer:the usb mouse receiver is not plugged into the computer

Explanation:

In the case above, one can say that the USB mouse receiver is not plugged into the computer.

What is a USB mouse?

A USB mouse is known to be a tool that is often attaches to a computers USB port.

In the case above, one can say that the USB mouse receiver is not plugged into the computer and as such it cannot perform the task it need to do.

Learn more about USB mouse from

https://brainly.com/question/10847782

#SPJ9

write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update. ​

Answers

Answer:

A) software

B)assembler

C)operating system

D)system software

E)data base

F)software license

G)machine code

H)ONLINE shopping apps

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files. What should you do

Answers

Answer:

Implement BitLocker with a TPM

Explanation:

In Computer science, a memory is a term used to describe the available space or an electronic device that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders. Some examples of a storage device are hard disk drive, CD-ROM, flash drive, etc.

Basically, there are two (2) main types of memory;

A. Read only memory (ROM).

B. Random access memory (RAM).

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

In this scenario, if you want to prevent the laptops from booting unless a special USB drive is inserted; you should implement BitLocker with a trusted platform module (TPM) on Microsoft Windows.

Name of the best Android keyboard
Pls I need it asap!! For educational purpose
I need your Ideologies​

Answers

I think Gboard is good, you can switch between languages quickly and you can translate in real time. Translation is not perfect, but it is the best translation available. Vocabulary and autocorrect is not bad too. You can change the background. It has some themes of its own, but you can always customise it with your own photo. It has instant gif, stickers and emoji options too. It also has a good collection of symbolic emojis like: *\0/*O_o(๑♡⌓♡๑)ᕙ( • ‿ • )ᕗ(☉。☉)!I cannot include all of them, they are in 100s.

But if you are looking for a solution for grammatical mistakes, then you may want to consider Grammarly.

[tex]\boxed{\underline{\bf \: ANSWER}}[/tex]

Well, just like the person before me has answered ; I prefer Gboard, a keyboard provided by Go.ogle over all the other options ones available while using android. As you can see in the attached picture, I use Gboard & have been using it for quite a lot of years now as well. Gboard provides smooth surface for typing & there's glide technology as well. There's an option to pin your clipboard (which I find really helpful) & tons of built-in emojis, emoticons (this feature is not available in many), GIFs & so on. Also you can customize your keyboard by changing themes (you can either select one of the many backgrounds they have or choose one you like; in my case I have a blue scenery clipart as my background which matches my phone's overall theme). You can also use Gboard if you prefer to text in more than 1 language (this feature is available in many other keyboards as well though).

Now moving on, I would suggest the Samsung Keyboard too (that is, of you are using Samsung gadgets). The only reason I prefer Gboard over this keyboard is because you can't customize Samsung Keyboard (you can only choose White/Dark mode). Also, emoticons aren't available.

Then at last, there's the Grammarly Keyboard. This keyboard is really good if you are looking for writing essays, paragraphs or speeches as it catches all your grammar errors. But at times, it can be a bit too much & the keyboard is not overall smooth to use (at least for me).

So there, these 3 are the best keyboards for Android users.

_____

Hope it helps.

RainbowSalt2222

Don's company has contracted with a service provider to receive a computing platform for all employees, complete with an operating system, database services, and a Web server. Don develops applications using tools delivered by the service provider. What type of service has Don's company signed up for?

Answers

Answer:

Platform as a Service (PaaS).

Explanation:

Cloud computing can be defined as a form of data computing which requires the use of shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Basically, cloud computing comprises three (3) service models and these include;

1. Platform as a Service (PaaS).

2. Software as a Service (SaaS).

3. Infrastructure as a Service (IaaS).

Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.

The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.

Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).

Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.

These are the different types of Platform as a Service;

1. Private PaaS.

2. Public PaaS.

3. Open PaaS.

4. Mobile PaaS.

5. Communications PaaS.

6. Hybrid PaaS.

In this scenario, the type of service Don's company signed up for is called Platform as a Service (PaaS).

Similarities between in line css and internal css

Answers

Answer:

inline css is used to style a specific html element. for this css style, you'll only need to add the style attribute to each html tag, without using selectors. this css type is not really recommended, as each html tag needs to be styled individually. managing your website may become too hard if you only use inline css.

Explanation:

queens

What defines interactive media? The user must play a role in writing the content of the media. The user must do something that determines what happens next. The user must help design the overall look and feel of the presentation. The user must provide feedback after using the media.

Answers

Answer:

What Is Interactive Media?

Interactive media is a method of communication in which the program's outputs depend on the user's inputs, and the user's inputs, in turn, affect the program's outputs. Simply put, it refers to the different ways in which people process and share information, or how they communicate with one another. Interactive media allows people to connect with others—whether that's people or organizations—making them active participants in the media they consume

Answer:

The user must do something that determines what happens next.

It is B.

Câu 1: Đất trồng là môi trường?

A. Cung cấp chất dinh dưỡng, ôxy

B. Giúp cây đứng vững

C. Cung cấp chất dinh dưỡng, ôxy, nước

D. Câu B và C

Answers

Answer:

D

Explanation:

what is computer virus?​

Answers

Answer:

A computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.

Answer:

A computer virus is a software program that can generate multiple copies of itself. Computer viruses are categorized by their infection targets.They are of the following types :-

boot sector virusesfile viruses

What happens when you drag a file from the Documents folder on the hard drive to the Pictures folder on the hard drive?

Answers

Answer:

The file changes its location within your hard drive while the file itself remains unchanged

Explanation:

The file's location will change from C:\Users\username\Documents to

C:\Users\username\Pictures

Other Questions
Which of the following is NOT an organ system in the human body?A. Endocrine systemB. Replicatory systemC. Digestive systemD. Lymphatic system An experiment consists of 400 observations and four mutually exclusive groups. If the probability of a randomly selected item being classified into any of the four groups is equal, then the expected number of items that will be classified into group 1 is ________. 3 different problems.solve b - 4 = 3.solve -32 = 8wsolve n = -4 7 difference between uniform motion and non uniform motion A refrigerator has a coefficient of performance equal to 4.00. The refrigerator takes in 110 J of energy from a cold reservoir in each cycle. (a) Find the work required in each cycle. J (b) Find the energy expelled to the hot reservoir. J Sybil, age 40, is single and supports her dependent parents who live with her, as well as her grandfather who is in a nursing home. She has AGI of $80,000 and itemized deductions of $8,000. What is the taxable income? Stella and Michael are helping their friend Austin move. Stella can move one box for every four boxes that Michael can move. If Stella moves ten boxes, how many boxes can Michael move? canten alguna historia de 5 prrafos pls no tengo nada es para un trabajo 0-ZOOLS6) The mass of a motorcycle is 250 kg. What is?A) Its weight on Earth in Newtons?B) Its weight on the moon (in Newtons)?gesC) The mass of your motorcycle on the moon? I need help answering this ASAP A sinusoidal graph has an amplitude of 9 and a midline of y = 2. Determinethe range of the graph. Can anyone tell me why by direct substitution of x, the equation (circled ones) equals to the indeterminate form, 0/0? When you can do x-k=6 something like that What is an advantage of electron microscopes compared to light microscopes?They have a much higher power of resolution.They can be used to view live specimens.They are inexpensive and commonly found in classrooms.They are helpful during dissections. Which shampoo would be displayed third? how did society origin? Help pleaseee I need it so bad Twice the sum of xand 5 equals 3. Suppose AABC = AEFD, AEFD = AGIH, ZA = 90, and mZF= 20. What is mZH?a. 20b. 70C. 90d. Cannot be determined mentsAvailable Aug 17 at 12am - Sep 30 at 11:59pm about 2 monthsGeography Ch.1 Check for understanding.tsente1. Name the 5 themes of Geography2. Name the two areas geography is divided into:3. What is a map maker called?4. Name the 3 regions Geography focuses on:5. Name the two types of location and explain how they work.6. What type of map shows man-made features of the earth and what mapsText EntryCopy and paste or type your submission right here. What are the coordinates of P?(b,0 a,00,a0,b