Answer:
1. append
2. array
3. elament
4. To the end of an array.
5. Changes all negative numbers to positives.
6. To do number calculations.
7. an elament
8. Assigning
9. zebra
10. len(tests)
Explanation:
got 100% on the test
Which sentence has correct parallel structure?
О А. The software allows users to create new documents, copying files from other sources, and saving new changes.
Users need a laptop, internet connection, and need an appropriate document editor.
SO B.
O C.
To install the application, connect the flash drive, run the setup, and restart the system.
OD.
The application bundle contains a DVD, the flash drive, and instruction manual.
The sentence that has parallel structure is "To install the application, connect the flash drive, run the setup, and restart the system." (opiton C)
What is parallel structure?The repeating of a certain grammatical form inside a phrase is known as parallel structure (also known as parallelism). A parallel construction is created by making each comparable object or notion in your phrase follow the same grammatical pattern.
Consider this example: "I forgave you when you lost my cat, when you left me at the airport, and when you threw out my favorite stuffed animal." The parallel structure is the recurrent usage of I forgave you when you.
Hence, option C is correct.
Learn more about parallel structure:
https://brainly.com/question/8055410
#SPJ1
What is it called when there is stored energy in the battery after an accident that has caused damage to the protective case or wiring harness?
A) Stranded energy
B) Explosive energy
C) Lost energy
D) Entrapped energy
B) Explosive energy is when there is stored energy in the battery after an accident that has caused damage to the protective case or wiring harness.
Is the energy stored when released may cause serious accidents or physical damage?Stored energy are known to be any form of mechanical, gravitational, hydraulic that is known to be energy stored in machines as well as in equipment.
Stored energy hazards if released accidentally can cause serious injury.
Therefore, B) Explosive energy is when there is stored energy in the battery after an accident that has caused damage to the protective case or wiring harness.
Learn more about energy from
https://brainly.com/question/13881533
#SPJ1
Python help
Instructions
Write a method swap_values that has three parameters: dcn, key1, and key2. The method should take the value in
the dictionary den stored with a key of key1 and swap it with the value stored with a key of key2. For example, the
following call to the method
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria")
swap_values (positions, "C", "PF")
should change the dictionary positions so it is now the following:
{'C': 'Jiang', 'PF': 'Anja', 'SF': 'Micah', 'PG': 'Devi', 'SG': 'Maria')
def swap_values(dcn, key1, key2):
temp = dcn[key1]
dcn[key1] = dcn[key2]
dcn[key2] = temp
return dcn
The method in the interface for a dictionary collection returns an iterator on the key/value pairs in the dictionary is the Keys () method.
Consider the scenario where you want to develop a class that functions like a dictionary and offers methods for locating the key that corresponds to a specific target value.
You require a method that returns the initial key corresponding to the desired value. A process that returns an iterator over those keys that map to identical values is also something you desire.
Here is an example of how this unique dictionary might be used:
# value_dict.py
class ValueDict(dict):
def key_of(self, value):
for k, v in self.items():
if v == value:
return k
raise ValueError(value)
def keys_of(self, value):
for k, v in self.items():
if v == value:
yield k
Learn more about Method on:
brainly.com/question/17216882
#SPJ1
You are working as a marketing analyst for an ice cream company, and you are presented with data from a survey on people's favorite ice cream flavors. In the survey, people were asked to select their favorite flavor from a list of 25 options, and over 800 people responded. Your manager has asked you to produce a quick chart to illustrate and compare the popularity of all the flavors.
which type of chart would be best suited to the task?
- Scatter plot
- Pie Chart
- Bar Chart
- Line chart
In this case, a bar chart would be the most suitable type of chart to illustrate and compare the popularity of all the ice cream flavors.
A bar chart is effective in displaying categorical data and comparing the values of different categories. Each flavor can be represented by a separate bar, and the height or length of the bar corresponds to the popularity or frequency of that particular flavor. This allows for easy visual comparison between the flavors and provides a clear indication of which flavors are more popular based on the relative heights of the bars.
Given that there are 25 different ice cream flavors, a bar chart would provide a clear and concise representation of the popularity of each flavor. The horizontal axis can be labeled with the flavor names, while the vertical axis represents the frequency or number of respondents who selected each flavor as their favorite. This visual representation allows for quick insights into the most popular flavors, any potential trends, and a clear understanding of the distribution of preferences among the survey participants.
On the other hand, a scatter plot would not be suitable for this scenario as it is typically used to show the relationship between two continuous variables. Pie charts are more appropriate for illustrating the composition of a whole, such as the distribution of flavors within a single respondent's choices. Line charts are better for displaying trends over time or continuous data.
Therefore, a bar chart would be the most effective and appropriate choice to illustrate and compare the popularity of all the ice cream flavors in the given survey.
for more questions on Bar Chart
https://brainly.com/question/30243333
#SPJ8
Write a program that find the average grade of a student. The program will ask the Instructor to enter three Exam scores. The program calculates the average exam score and displays the average grade.
The average displayed should be formatted in fixed-point notations, with two decimal points of precision. (Python)
Answer:
# Prompt the instructor to enter three exam scores
score1 = float(input("Enter the first exam score: "))
score2 = float(input("Enter the second exam score: "))
score3 = float(input("Enter the third exam score: "))
# Calculate the average exam score
average_score = (score1 + score2 + score3) / 3
# Calculate the average grade based on the average exam score
if average_score >= 90:
average_grade = "A"
elif average_score >= 80:
average_grade = "B"
elif average_score >= 70:
average_grade = "C"
elif average_score >= 60:
average_grade = "D"
else:
average_grade = "F"
# Display the average grade in fixed-point notation with two decimal points of precision
print("The average grade is: {:.2f} ({})".format(average_score, average_grade))
Explanation:
Sample Run:
Enter the first exam score: 85
Enter the second exam score: 78
Enter the third exam score: 92
The average grade is: 85.00 (B)
The given Python program determines the corresponding letter grade based on the average score, and then displays the average score and grade with the desired formatting.
What is Python?
Python is a high-level, interpreted programming language that was first released in 1991. It is designed to be easy to read and write, with a simple and intuitive syntax that emphasizes code readability. Python is widely used in various fields such as web development, data science, machine learning, and scientific computing, among others.
Python Code:
# Prompt the user to enter three exam scores
exam1 = float(input("Enter score for Exam 1: "))
exam2 = float(input("Enter score for Exam 2: "))
exam3 = float(input("Enter score for Exam 3: "))
# Calculate the average exam score
average = (exam1 + exam2 + exam3) / 3
# Determine the letter grade based on the average score
if average >= 90:
grade = 'A'
elif average >= 80:
grade = 'B'
elif average >= 70:
grade = 'C'
elif average >= 60:
grade = 'D'
else:
grade = 'F'
# Display the average score and grade
print("Average score: {:.2f}".format(average))
print("Grade: {}".format(grade))
In this program, we use the float() function to convert the input values from strings to floating-point numbers. We then calculate the average score by adding up the three exam scores and dividing by 3. Finally, we use an if statement to determine the letter grade based on the average score, and we use the .format() method to display the average score and grade with the desired formatting. The :.2f notation in the format string specifies that the average score should be displayed with two decimal places.
To know more about string visit:
https://brainly.com/question/16101626
#SPJ1
Which of the following is a factual statement about the term audience? Select all that apply.
Question 8 options:
Audience refers only to real readers or users.
Audience refers to both real and imagined readers or users.
Your message will only reach the audience it is intended to reach.
Being an effective communicator depends on how well you can tailor a message to an audience.
It is not necessary for an audience to be involved in usability testing of a product.
The correct statements are :
1. Audience refers to both real and imagined readers or users.
4. Being an effective communicator depends on how well you can tailor a message to an audience.
These two are factual about the term audience.
The first statement is not entirely true, as the term audience can refer not only to real readers or users but also to imagined or hypothetical readers or users that a writer or speaker is addressing in their communication.
The third statement is also not entirely true, as the intended audience may not always be the actual audience, and a message may reach unintended recipients or fail to reach the intended ones.
Being an effective communicator depends on how well you can tailor your message to your intended audience, taking into consideration their interests, values, needs, and level of knowledge.
Understanding your audience's characteristics and preferences can help you choose appropriate language, tone, style, and content to make your message more engaging, persuasive, and memorable.
It's important to note that the intended audience may not always be the actual audience, as a message may reach unintended recipients or fail to reach the intended ones due to various factors such as miscommunication, noise, or selective attention.
The right statements are:
1. Audience refers to both real and imagined readers or users.
4. Being an effective communicator depends on how well you can tailor a message to an audience.
For more questions on effective communication, visit:
https://brainly.com/question/26152499
#SPJ11
1. Suppose a database table named Address contains fields named City and State. Write an SQL SELECT statement that combines these fields into a new field named CityState. 2. Suppose a database table named Students contains the fields FirstName, LastName, and IDNumber. Write an SQL SELECT statement that retrieves the IDNumber field for all records that have a Last Name equal to "Ford". 3. Write an SQL query that retrieves the ID, Title, Artist, and Price from a database table named Albums. The query should sort the rows in ascending order by Artist.
SELECT column1, column2 FROM table1, table2 WHERE column2='value' is the syntax. In the SQL query above: The SELECT phrase designates one or more columns to be retrieved; to specify more than one column, separate column names with a comma.
What is SELECT statements?A database table's records are retrieved using a SQL SELECT statement in accordance with criteria specified by clauses (such FROM and WHERE). The syntax is as follows:The SQL query mentioned above:SELECT column1, column2 FROM table1, table2 AND column2='value';
Use a comma and a space to separate the names of several columns when specifying them in the SELECT clause to get one or more columns. The wild card * will retrieve all columns (an asterisk).A table or tables to be queried are specified in the FROM clause. If you're specifying multiple tables, place a comma and a space between each table name.Only rows in which the designated column contains the designated value are chosen by the WHERE clause. Using the syntax WHERE last name='Vader', the value is enclose in single quotes.The statement terminator is a semicolon (;). Technically, if you only transmit one statement to the back end, you don't need a statement terminator; if you send many statements, you need. It's preferable to include it.To Learn more About SELECT phrase refer to:
https://brainly.com/question/26047758
#SPJ4
user intent refers to what the user was trying to accomplish by issuing the query
Answer:
: User intent is a major factor in search engine optimisation and conversation optimisation. Most of them talk about customer intent ,however is focused on SEO not CRO
Explanation:
The 1D array CustomerName[] contains the names of customers in buying electronics at a huge discount
in the Ramadan Sales. The 2D array ItemCost[] contains the price of each item purchased, by each
customer. The position of each customer’s purchases in the two array is the same, for example, the
customer in position 5 in CustomerName[] and ItemCost[] is the same. The variable Customers
contains the number of customers who have shopped. The variable Items contains the number of items
each customer bought. All customers bought the same number of products with the rules of the sale
dictating they must buy 3 items with a minimum spend of 1000AED. The arrays and variables have
already been set up and the data stored.
Write a function that meets the following requirements:
• calculates the combined total for each customer for all items purchased
• Stores totals in a separate 1D array
• checks to make sure that all totals are at least 1000AED
• outputs for each customer: – name – combined total cost – average money spent per product
You must use pseudocode or program code and add comments to explain how your code works. You do
not need to initialise the data in the array.
Here's a Python code that meets the requirements you mentioned:
python
Copy code
def calculate_totals(CustomerName, ItemCost, Customers, Items):
# Create an empty array to store the totals for each customer
total_cost = []
# Iterate over each customer
for i in range(Customers):
# Get the start and end indices of the items for the current customer
start_index = i * Items
end_index = start_index + Items
# Calculate the total cost for the current customer
customer_total = sum(ItemCost[start_index:end_index])
# Check if the total cost is at least 1000AED
if customer_total < 1000:
print("Total cost for customer", CustomerName[i], "is less than 1000AED.")
# Calculate the average money spent per product
average_cost = customer_total / Items
# Add the customer's total cost to the array
total_cost.append(customer_total)
# Print the customer's name, total cost, and average money spent per product
print("Customer:", CustomerName[i])
print("Total Cost:", customer_total)
print("Average Cost per Product:", average_cost)
print()
# Return the array of total costs for each customer
return total_cost
# Example usage:
CustomerName = ["John", "Mary", "David", "Sarah"]
ItemCost = [200, 300, 400, 500, 600, 700, 800, 900, 1000, 1100, 1200, 1300]
Customers = 4
Items = 3
calculate_totals(CustomerName, ItemCost, Customers, Items)
This code takes the CustomerName array and ItemCost array as inputs, along with the number of customers Customers and the number of items per customer Items. It calculates the total cost for each customer, checks if the total is at least 1000AED, calculates the average cost per product, and prints the results for each customer. The totals are stored in the total_cost array, which is then returned by the function.
Learn more about python on:
https://brainly.com/question/30391554
#SPJ1
Need help fixing my code!!
Keep getting an error code that says my member is inaccessible
The program that shows the fixing of the code is given below.
How to explain the informationclass Player {
protected:
std::string name;
Card playerCards[10];
bool canHit;
int handvalue;
public:
Player(const std::string& playerName) : name(playerName), canHit(true), handvalue() {}
void receiveCard(const Card& card) {
playerCards[handvalue++] = card;
}
void setCanHit(bool canHitValue) {
canHit = canHitValue;
}
int getHandValue() const {
return handvalue;
}
};
Learn more about program on
https://brainly.com/question/26642771
#SPJ1
state the base of correct addition of 27 + 6 =34
Answer:
9
Explanation:
lets do calculations with ONLY the rightmost digits, ie., 7 + 6 = 4, so we're ignoring the carry.
Then, following must be true as well:
7+5 = 3
7+4 = 2
7+3 = 1
7+2 = 0 <= this reveals our base 9
7+1 = 8
7+0 = 7
all flowcharts begin with me.i am elliptical in shape.
Note that it is FALSE to state that "all flowcharts begin with me.i am elliptical in shape."
How is this so?While it is common for flowcharts to start with a shape, typically represented as an oval or rounded rectangle, it is not always an elliptical shape.
The starting point of a flowchart can vary depending on the specific system or process being depicted.
The purpose of the initial shape is to indicate the beginning or initiation of the flowchart, and it can take various forms depending on the conventions and preferences of the flowchart designer.
Learn more about flow charts at:
https://brainly.com/question/6532130
#SPJ1
Full Question:
Although part of your question is missing, you might be referring to this full question:
All flowcharts begin with me.i am elliptical in shape. True or False?
What is the benefit of time boxing the preparation for the first program increment planning event
The benefit of timeboxing for the preparation for the first program increment planning event is that it seeks to deliver incremental value in the form of working such that the building and validating of a full system.
What is timeboxing?Timeboxing may be defined as a simple process of the time management technique that significantly involves allotting a fixed, maximum unit of time for an activity in advance, and then completing the activity within that time frame.
The technique of timeboxing ensures increments with the corresponding value demonstrations as well as getting prompt feedback. It allocates a fixed and maximum unit of time to an activity, called a timebox, within which planned activity takes place.
Therefore, timeboxing seeks the delivery of incremental value in the form of working such that the building and validating of a full system.
To learn more about Timeboxing, refer to the link:
https://brainly.com/question/29508600
#SPJ9
HELP ASAP
Tasks of Forensic Tools
This activity will help you meet these educational goals:
- Content Standards—You will learn about the tasks performed by forensic analysis tools.
- Inquiry—You will conduct online research, in which you will collect information and communicate your results in written form.
- 21st Century Skills—You will employ online tools for research and communicate effectively.
Directions:
Read the instructions for this self-checked activity. Type in your response to each question, and check your answers. At the end of the activity, write a brief evaluation of your work.
Activity
Research and describe the tasks performed by forensic analysis tools.
Answer:
Here are the tasks performed by forensic analysis tools:
Acquisition: This is the first step an analysis tool employs. The procedure involves capturing the data that the digital forensics expert needs to assess. The forensic expert creates a copy of the data, which prevents the original data from corrupting. There are two methods of acquisition: physical acquisition and logical partition. During physical acquisition, the experts copy the entire storage and analyze it. During logical partition, the experts create virtual partitions of the storage. Each partition has an individual operating system in it.
Validation and discrimination: Validation helps in verifying whether the copied data is correct or not. Discrimination is the next step, where the forensic experts sort suspicious and non-suspicious data. Validation and discrimination can be done in three ways: hashing, filtering, or analyzing file headers. Hashing converts characters into smaller values, making them easier to find. Filtering helps sort out suspicious files. Analyzing file headers helps the experts check whether a particular file has an incorrect file extension.
Extraction: Extraction is the next step, in which forensic experts recover the data. The experts employ different data-viewing techniques so they can view various file and folders. They also perform a keyword search, which helps them arrive at the target file that contains the needed information. Extraction also involves decompressing any compressed files so that the experts can view the data in detail. Experts also carry out carving, where they salvage and reconstruct partially deleted files and folders. Then, they try to decrypt any encrypted files using possible passwords. Once the experts find evidence, they bookmark it to use it for later reference.
Reconstruction: After finding evidence, the experts reconstruct another copy that contains the evidence. They can duplicate a file from one disk to another disk or one image to another disk. Similarly, they can create a copy by duplicating one partition to another partition or an image to another partition.
Reporting: Once the evidence is reconstructed, the experts create a detailed report of their findings. They create reports using HTML or web pages. Some experts use PDF formats to produce the reports.
Explanation:
Sample Answer from Edmentum/Plato bestie!! <3
Trying to solve this problem with for and while loops. Help appreciated. Thanks.
mystery_int = 7 #You may modify the lines of code above, but don't move them! #When you Submit your code, we'll change these lines to #assign different values to the variables. #Use a loop to find the sum of all numbers between 0 and #mystery_int, including bounds (meaning that if #mystery_int = 7, you add 0 + 1 + 2 + 3 + 4 + 5 + 6 + 7). # #However, there's a twist: mystery_int might be negative. #So, if mystery_int was -4, you would -4 + -3 + -2 + -1 + 0. # #There are a lot of different ways you can do this. Most of #them will involve using a conditional to decide whether to #add or subtract 1 from mystery_int. # #You may use either a for loop or a while loop to solve this, #although we recommend using a while loop.
Sure, I can help you with that. Here's a solution using a while loop:
The Programmystery_int = 7
total = 0
if mystery_int >= 0:
i = 0
while i <= mystery_int:
total += i
i += 1
else:
i = 0
while i >= mystery_int:
total += i
i -= 1
print(total)
And here's a solution using a for loop:
mystery_int = 7
total = 0
if mystery_int >= 0:
for i in range(mystery_int + 1):
total += i
else:
for i in range(mystery_int, 1):
total += i
print(total)
Both solutions work by first checking if mystery_int is positive or negative. If it's positive, we use a loop to add up all the numbers from 0 to mystery_int. If it's negative, we use a loop to add up all the numbers from mystery_int to 0. In the for loop solution, we use the range function to generate the appropriate sequence of numbers to add up.
Read more about while loop here:
https://brainly.com/question/19344465
#SPJ1
100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.
I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :
- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9
I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?
I have already asked this before and recieved combinations, however none of them have been correct so far.
Help is very much appreciated. Thank you for your time!
Based on the information provided, we can start generating possible six-digit password combinations by considering the following:
The password contains one or more of the numbers 2, 6, 9, 8, and 4.
The password has a double 6 or a double 9.
The password does not include 269842.
One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.
Using this method, we can generate the following list of possible password combinations:
669846
969846
669842
969842
628496
928496
628492
928492
624896
924896
624892
924892
648296
948296
648292
948292
Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.
I live in Pennsylvania which observes eastern standard time.
If you came for a visit, what change ( if any) would you have to make to your watch?
Explain your answer.
Answer:
mudar o horário de acordo com a vista
Explanation:
what is the main difference between a computer program and computer software
Answer:
Think of computer software sort of as DNA, because DNA is the human body's computer software. And a computer program is like an activity your body does.
Explanation:
Sorry if this didn't help.
HELP
Which of the following is an example of an object-oriented programming language?
A) Ruby
B) Python
C) C++
D) HTML
Answer:Java, C++, and Ruby
Explanation:
Like Python and JavaScript, many languages that are not strictly object-oriented also provide features like classes and objects inspired by object-oriented programming.
What Is Cold Messaging?
Answer:
Cold messaging is sending prospects messages when they are not primed to listen to you. It’s like sending messages to people who, with a little effort, can turn into your potential clients eventually.
Explanation:
However, there is a very thin line between cold messaging and spamming. The only difference is the target audience. A right cold messaging strategy means sending the right messages to the right people. While spamming means hitting up every profile that comes into the way.
Write a function that accepts a positive random number as a parameter and returns the sum of the random number's digits. Write a program that generates random numbers until the sum of the random number's digits divides the random number without remainder. assembly language
Answer:
Explanation:
The following Python program has a function called addDigits which takes a number as a parameter and returns the sum of the digits. Then the program creates a loop that keeps creating random numbers between 222 and 1000 and divides it by the value returned from the function addDigits. If the remainder is 0 is prints out a statement and breaks the loop, ending the program. The picture below shows the output of the program.
import random
def addDigits(num):
sum = 0
for x in str(num):
sum += int(x)
return sum
sum = addDigits(random.randint(222, 1000))
while True:
myRandomNum = random.randint(2, 99)
if (sum % myRandomNum) == 0:
print("No remainder between: " + str(sum) + " and " + str(myRandomNum))
break
whats your favorite rocket leage carr???????????????????????????? comment if there is already 2 answers brainleist for first
Answer:
hello
Explanation:
Octane is my favorite
As citizens online or in real life, how, or why, do the choices we make, almost always seems to have an effect (positive or negative) on others?
Answer:
The choices we make as citizens online or in real life have both positive and negative effects on others because we are social beings, who live in an interconnected world. Every choice has some consequences on the decision maker or on others. We make the choices, but the consequences follow natural laws, which we cannot control. When Adam and Eve chose to disobey God, human beings down the ages lost their innocence and freedom. When the Nazis chose to purify their race of European Jews, there was the Holocaust between 1941 and 1945. When the Minneapolis police officer chose to slaughter George Floyd in cold blood, violent protests erupted throughout the U.S.
Another current example to buttress this is the ravaging coronavirus pandemic, which originated in Wuhan - China. When the Chinese Communist government chose to suppress the information about the virus as it usually does, the aftermath is the thousands of dead humans all over the world, the economic downturn, loss of jobs, virus infections with other public health side effects, plus many other untold consequences.
Had the Chinese government made a different choice, the virus could not have spread worldwide as it had. Similarly, some citizens online choose to circulate unverifiable ("fake news") information. Many people have been misled by their antics, some have lost their lives, while many others live in perpetual bigotry and hatred. All these are because of individual choices.
Explanation:
Choice is a concept in decision making. It is the judging of the merits of multiple options so that one or some of the options are selected. When a voter votes for one candidate against others, she has made a choice (decision). Of course, choices have consequences, which we must live with. Choices also define our present and our future.
irving is running cable underground beside his driveway to power a light at his entrance .what type of cable is he most likely using?
A.MC
B.NNC
C.UFD
D.UF
Based on the given information, Irving is running cable underground beside his driveway to power a light at his entrance. The most likely type of cable he would use in this scenario is "D. UF" cable.
Why is the cable Irving is using a UF cable and its importanceUF stands for "Underground Feeder" cable, which is specifically designed for underground installations.
It is commonly used for outdoor applications, such as running power to lights, pumps, or other outdoor fixtures. UF cable is moisture-resistant and has insulation suitable for direct burial without the need for additional conduit or piping.
Read more about cables here:
https://brainly.com/question/13151594
#SPJ1
5 importance of Computer in a modern offices
Answer:
A computer helps to communicate faster with the customer by using the internet, online communication tools, and internet phone system. ... The computer is used in business to create websites for business. The computer is important in business to automate business transactions by using online banking, payment Gateway
Explanation:
Business Computer Functions
Most business processes now involve the use of computers. Here are some of them:
Communications: Companies use computers for both internal and external communications via email, messenger systems, conferencing and word processing.
Research: Businesses can use computers to research industry trends, patents, trademarks, potential clients and competitors via search engines and proprietary databases.
Media Production: Computers are now used to produce different types of media, including graphics, video and audio productions.
Data Tracking and Storage: Although paper files containing hard copy documents are still in use, organizations also store and manage their data using software and the cloud.
Product Development: Developers use computers to create new products and services.
Human resources: Internal HR processes and payroll systems are managed using software and online services.
A __________ is a special Spanning Tree Protocol (STP) frame that switches use to communicate with other switches to prevent loops from happening in the first place.
Which of the following is the process of writing the step-by-step instructions that can be understood by a computer?
Answer:
The process should be called an algorithm!
To show formulas instead of values, click on the formulas tab in the ribbon, then in the formula auditing group, click on the show formulas option. True or False?
It's true that to show formulas instead of values, click on the formulas tab in the ribbon, then in the formula auditing group, click on the show formulas option.
What is a formula auditing group?
"Formula auditing is an important Excel tool that allows users to demonstrate the relationship between formulas and cells."
The Excel Formula Auditing toolbar assists the user in quickly and easily locating:
the cells contribute to the calculation of a formula in the active cell.the formulas that refer to the active cell.The output of Formula Auditing is graphically represented by arrow lines, making the entire formula visualization simple. With a single command, the user can display all of the formulas in the active worksheet. If your formulas refer to cells in a different workbook, it will open that workbook as well.
To know more about formula auditing, visit: https://brainly.com/question/17179006
#SPJ4
how to Develop Administrative Assistant Skills
Answer:
Multitasking, Flexible and resourceful.
Explanation:
im not sure what your asking for but to be or i dont now how to explain to good but hope you get what im mean it no brainier
Drag each tile to the correct box.
Match the certifications to the job they best fit.
CompTIA A+
Cisco Certified Internetwork Expert (CCIE)
Microsoft Certified Solutions Developer (MCSD)
help desk technician
network design architect
software developer
Answer:
software developer- microsoft certified solutions developer
help desk technician- CompTIAA+
network design architect- Cisco certified internetwork expert
Explanation
edmentum