c What is the difference between sorting and filtering activities in Excel 2016​

Answers

Answer 1

Answer:

The filter tool gives you the ability to filter a column of data within a table to isolate the key components you need. Sort tool allows you to sort by date, number, alphabetical order and more


Related Questions

why is this happening and how do I fix it?

why is this happening and how do I fix it?

Answers

Answer:

who is known as prophet of the computer?why?

What font family is Times New Roman an what font family is Arial?

Answers

Answer:

Some Font Examples

Generic Font Family                 Examples of Font Names

Serif                    Times New Roman Georgia Garamond

Sans-serif                          Arial Verdana Helvetica

Monospace                     Courier New Lucida Console Monaco

Cursive                        Brush Script MT Lucida Handwriting

Explanation:

hope it help

Answer:

R family Font on Windows Font on Unixsans Arial Arialserif Times New Roman Timesmono Courier Couriersymbol Standard Symbols L Symbol

examples of application software​

Answers

Microsoft suite of products (Office, Excel, Word, PowerPoint, Outlook, etc.)
Internet browsers like Firefox, Safari, and Chrome
Mobile pieces of software such as Pandora (for music appreciation), Skype (for real-time online communication), and Slack (for team collaboration)

Answer:

Examples of application software

Microsoft wordMicrosoft ExcelMedia PlayerWeb BrowserPhoto EditorSimulatorsEmail system

Explanation:

Application software

Application software are specific purpose software designed for users or group pf users.

Examples of application software

Microsoft wordMicrosoft ExcelMedia PlayerWeb BrowserPhoto EditorSimulatorsEmail system

Drag the tiles to the boxes to form correct pairs.
Match the items to their uses.
simple design template
contrast colors and background
illustrations
used to improve the appearance of the presentation
used to make the content easily readable
note page
used to refer to content while delivering a presentation
used to complement content

Answers

Drag the tiles into the boxes to create the right pairs. Not every tile will be employed. Match up every pair. Get the information you need right away!

Two lines are perpendicular when they cross at a 90° angle.

How do I ask for free boxes?

Visit Office Depot, Staples, or any other nearby retailer of office supplies. To find out if they have any free boxes they don't use, ask to talk to the management. Find out whether they have boxes for printer or copy paper especially. You can get packing supplies from Amazon, yes. These could consist of bubble wrap, boxes, stretch wrap, poly bags, and more. If US vendors utilise shipping companies like UPS, FedEx, and USPS, they might also receive free goods from them.

Know more perpendicular Visit:

https://brainly.com/question/29268451

#SPJ1

100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.

I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :

- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9

I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?

I have already asked this before and recieved combinations, however none of them have been correct so far.

Help is very much appreciated. Thank you for your time!

Answers

Based on the information provided, we can start generating possible six-digit password combinations by considering the following:

   The password contains one or more of the numbers 2, 6, 9, 8, and 4.

   The password has a double 6 or a double 9.

   The password does not include 269842.

One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.

Using this method, we can generate the following list of possible password combinations:

669846

969846

669842

969842

628496

928496

628492

928492

624896

924896

624892

924892

648296

948296

648292

948292

Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.

Will give brainlest pls pls pls help​

Will give brainlest pls pls pls help

Answers

Answer:

graphs photos files

Explanation:

...

Answer:

COMPUTER

GRAPHS

Explanation:

Integer numElements is read from input. Then, numElements strings are read and stored in vector aprTopPicks, and numElements strings are read and stored in vector novTopPicks. Perform the following tasks:

If aprTopPicks is equal to novTopPicks, output "November's top picks are the same as April's top picks." Otherwise, output "November's top picks are not the same as April's top picks."

Assign novBackup as a copy of novTopPicks.

Ex: If the input is 2 brick gold red green, then the output is:

April's top picks: brick gold
November's top picks: red green
November's top picks are not the same as April's top picks.
November's backup: red green
in c++

Answers

Answer:

#include <iostream>

#include <vector>

#include <algorithm>

int main() {

   int numElements;

   std::cin >> numElements;

   std::vector<std::string> aprTopPicks(numElements);

   for (int i = 0; i < numElements; i++) {

       std::cin >> aprTopPicks[i];

   }

   std::vector<std::string> novTopPicks(numElements);

   for (int i = 0; i < numElements; i++) {

       std::cin >> novTopPicks[i];

   }

   if (aprTopPicks == novTopPicks) {

       std::cout << "November's top picks are the same as April's top picks." << std::endl;

   } else {

       std::cout << "November's top picks are not the same as April's top picks." << std::endl;

   }    

   std::vector<std::string> novBackup(numElements);

   std::copy(novTopPicks.begin(), novTopPicks.end(), novBackup.begin());  

   std::cout << "April's top picks: ";

   for (int i = 0; i < numElements; i++) {

       std::cout << aprTopPicks[i] << " ";

   }

   std::cout << std::endl;

   std::cout << "November's top picks: ";

   for (int i = 0; i < numElements; i++) {

       std::cout << novTopPicks[i] << " ";

   }

   std::cout << std::endl;    

   std::cout << "November's top picks are ";

   if (aprTopPicks == novTopPicks) {

       std::cout << "the same as ";

   } else {

       std::cout << "not the same as ";

   }

   std::cout << "April's top picks." << std::endl;

   std::cout << "November's backup: ";

   for (int i = 0; i < numElements; i++) {

       std::cout << novBackup[i] << " ";

   }

   std::cout << std::endl;

   return 0;

}

Explanation:

Answer:

c++

Explanation:

The ethical and appropriate use of a computer includes_____. Select 4 options.

Answers

The ethical and appropriate use of a computer encompasses several key principles that promote responsible and respectful behavior in the digital realm.

Four important options include:

1. Always ensuring that the information you use is correct: It is essential to verify the accuracy and reliability of the information we use and share to avoid spreading false or misleading content.

Critical evaluation of sources and fact-checking are vital in maintaining integrity.

2. Never interfering with other people's devices: Respecting the privacy and property rights of others is crucial. Unauthorized access, hacking, or tampering with someone else's computer or devices without their consent is unethical and a violation of their privacy.

3. Always ensuring that the programs you write are ethical: When developing software or coding, it is important to consider the potential impact of your creations.

Ethical programming involves avoiding harmful or malicious intent, ensuring user safety, respecting user privacy, and adhering to legal and ethical standards.

4. Never interfering with other people's work: It is essential to respect the intellectual property and work of others. Plagiarism, unauthorized use, or copying of someone else's work without proper attribution or permission is unethical and undermines the original creator's rights and efforts.

In summary, the ethical and appropriate use of a computer involves verifying information accuracy, respecting privacy and property rights, developing ethical programs, and avoiding interference with other people's work.

These principles promote a responsible and respectful digital environment that benefits all users.

For more such questions on ethical,click on

https://brainly.com/question/30018288

#SPJ8

The probable question may be:
The ethical and appropriate use of a computer includes_____.

Select 4 options.

-always ensuring that the information you use is correct

-never interfering with other people's devices

-always ensuring that the programs you write are ethical

-never interfering with other people's work

What are the 2 levels of formatting in a word document

Answers

Answer:

Paragraph Styles and character formatting (font, color, etc.)

Can you provide an example of how computer programming is applied in real-
world situations?

Answers

An example of how computer programming is applied in real world situations is the use of traffic lights.

How is this so?

The traffic flow data is processed by the computer to establish the right sequence for the lights at junctions or ramps. The sequencing information is sent from the computer to the signals via communications equipment.

INRIX Signal Analytics is the first cloud-based solution that harnesses big data from linked automobiles to assist traffic experts in identifying and understanding excessive delays at signalized junctions throughout the country — with no hardware or fieldwork required.

Learn more about computer programming:
https://brainly.com/question/14618533
#SPJ1

A capacitor of capacitance 102/π µF is connected across a 220 V, 50 Hz A.C. mains. Calculate the capacitive reactance, RMS value of current and write down the equations of voltage and current.

Answers

Answer:

The capacitive reactance will be "100Ω" and RMS value of current is "2.2 A". A further explanation is provided below.

Explanation:

Given:

\(C =\frac{10^2}{\pi}\times 10^{-6} \ F\)

\(V_{RMS}=220 \ V\)

\(f = 50 \ Hz\)

Now,

The capacitive reactance will be:

⇒ \(X_c=\frac{1}{\omega C} =\frac{1}{2 \pi f C}\)

                   \(=\frac{1}{2\times \pi\times 50\times \frac{10^{-4}}{\pi} }\)

                   \(=100 \ \Omega\)

RMS value of current will be:

⇒ \(I_{RMS}=\frac{V_{RMS}}{X_c}\)

             \(=\frac{220}{100}\)

             \(=2.2 \ A\)

So that,

⇒ \(V_m=220\times \sqrt{2}\)

         \(=311 \ V\)

⇒ \(I_m=2.2\times \sqrt{2}\)

         \(=3.1 \ A\)

hence,

The equation will be:

⇒ \(\nu=311 sin31 \ 4t\)

and,

⇒ \(i=3.1 sin(314t+\frac{\pi}{2} )\)

Finish and test the following two functions append and merge in the skeleton file:
(1) function int* append(int*,int,int*,int); which accepts two dynamic arrays and return a new array by appending the second array to the first array.
(2) function int* merge(int*,int,int*,int); which accepts two sorted arrays and returns a new merged sorted array.
#include
using namespace std;
int* append(int*,int,int*,int);
int* merge(int*,int,int*,int);
void print(int*,int);
int main()
{ int a[] = {11,33,55,77,99};
int b[] = {22,44,66,88};
print(a,5);
print(b,4);
int* c = append(a,5,b,4); // c points to the appended array=
print(c,9);
int* d = merge(a,5,b,4);
print(d,9);
}
void print(int* a, int n)
{ cout << "{" << a[0];
for (int i=1; i cout << "," << a[i];
cout << "}\n"; }
int* append(int* a, int m, int* b, int n)
{
// wru=ite your codes in the text fields
}
int* merge(int* a, int m, int* b, int n)
{
// wru=ite your codes in the text fields
}

Answers

Answer:

Explanation:

#include <iostream>

using namespace std;

int* append(int*,int,int*,int);

int* merge(int*,int,int*,int);

void print(int*,int);

int main()

{ int a[] = {11,33,55,77,99};

int b[] = {22,44,66,88};

print(a,5);

print(b,4);

int* c = append(a,5,b,4); // c points to the appended array=

print(c,9);

int* d = merge(a,5,b,4);

print(d,9);

}

void print(int* a, int n)

{ cout << "{" << a[0];

for (int i=1; i<n; i++)

cout << "," << a[i];

cout << "}\n";

}

int* append(int* a, int m, int* b, int n)

{

int * p= (int *)malloc(sizeof(int)*(m+n));

int i,index=0;

for(i=0;i<m;i++)

p[index++]=a[i];

for(i=0;i<n;i++)

p[index++]=b[i];

return p;

}

int* merge(int* a, int m, int* b, int n)

{

int i, j, k;

j = k = 0;

int *mergeRes = (int *)malloc(sizeof(int)*(m+n));

for (i = 0; i < m + n;) {

if (j < m && k < n) {

if (a[j] < b[k]) {

mergeRes[i] = a[j];

j++;

}

else {

mergeRes[i] = b[k];

k++;

}

i++;

}

// copying remaining elements from the b

else if (j == m) {

for (; i < m + n;) {

mergeRes[i] = b[k];

k++;

i++;

}

}

// copying remaining elements from the a

else {

for (; i < m + n;) {

mergeRes[i] = a[j];

j++;

i++;

}

}

}

return mergeRes;

}

write a complete program that declares an integer variable

reads a value from the keyboard into that variable, and writes a single line to standard out[ut consisting of the variable's value, twice the value, and the square of the value, separated by single spaces

Besides the number, nothing else should be in the line written to standard output except for the spaces separating the values.

Answers

Answer:

Java:

import java.util.Scanner;

public class Main {

 public static void main(String[] args) {

   Scanner sc = new Scanner(System.in);

   int number = sc.nextInt();

   System.out.println(number + " " + number*2 + " " + number**2);

 }

}

Python:

num = int(input("Number: "))

print(num+" "+num*2+" "+num**2)

C++:

#include <iostream>

int main() {

 int number;

 std::cin >> number;

 std::cout << num << " " << num*2 << " " << num**2;

 return 0;

}

https://www.celonis.com/solutions/celonis-snap

Using this link

To do this alternative assignment in lieu of Case 2, Part 2, answer the 20 questions below. You
will see on the left side of the screen a menu for Process Analytics. Select no. 5, which is Order
to Cash and click on the USD version. This file is very similar to the one that is used for the BWF
transactions in Case 2, Part 2.
Once you are viewing the process analysis for Order to Cash, answer the following questions:
1. What is the number of overall cases?
2. What is the net order value?
Next, in the file, go to the bottom middle where you see Variants and hit the + and see what it
does to the right under the detail of variants. Keep hitting the + until you see where more than a
majority of the variants (deviations) are explained or where there is a big drop off from the last
variant to the next that explains the deviations.
3. What is the number of variants you selected?
4. What percentage of the deviations are explained at that number of variants, and why did you
pick that number of variants?
5. What are the specific variants you selected? Hint: As you expand the variants, you will see on
the flowchart/graph details on the variants.
6. For each variant, specify what is the percentage of cases and number of cases covered by that
variant? For example: If you selected two variants, you should show the information for each
variant separately. If two were your choice, then the two added together should add up to the
percentage you provided in question 4 and the number you provided in question 3.
7. For each variant, how does that change the duration? For example for the cases impacted by
variant 1, should show a duration in days, then a separate duration in days for cases impacted
by variant 2.
At the bottom of the screen, you see tabs such as Process, Overview, Automation, Rework, Benchmark,
Details, Conformance, Process AI, Social Graph, and Social PI. On the Overview tab, answer the
following questions:
8. In what month was the largest number of sales/highest dollar volume?
9. What was the number of sales items and the dollar volume?
10. Which distribution channel has the highest sales and what is the amount of sales?
11. Which distribution channel has the second highest sales and what is the amount of sales?
Next move to the Automation tab and answer the following questions:
12. What is the second highest month of sales order?
13. What is the automation rate for that month?
Nest move to the Details tab and answer the following questions:
14. What is the net order for Skin Care, V1, Plant W24?
15. What is the net order for Fruits, VV2, Plant WW10?
Next move to the Process AI tab and answer the following questions:
16. What is the number of the most Common Path’s KPI?
17. What is the average days of the most Common Path’s KPI?
18. What other information can you get off this tab?
Next move to the Social Graph and answer the following questions:
19. Whose name do you see appear on the graph first?
20. What are the number of cases routed to him at the Process Start?

Answers

1. The number of overall cases are 53,761 cases.

2. The net order value of USD 1,390,121,425.00.

3. The number of variants selected is 7.4.

4. Seven variants were selected because it provides enough information to explain the majority of the deviations.

5. Seven variants explain 87.3% of the total variance, including order, delivery, credit limit, material availability, order release, goods issue, and invoice verification.

10. January recorded the highest sales volume, with 256,384 items sold for USD 6,607,088.00. Wholesale emerged as the top distribution channel, followed by Retail.

12. December stood out as the second-highest sales month,

13. with an automation rate of 99.9%.

14. Notable orders include Skin Care, V1, Plant W24 (USD 45,000.00) and

15. Fruits, VV2, Plant WW10 (USD 43,935.00).

17. The most common path had a KPI of 4, averaging 1.8 days.

18. This data enables process analysis and improvement, including process discovery, conformance, and enhancement.

19. The Social Graph shows Bob as the first name,

20. receiving 11,106 cases at the Process Start.

1. The total number of cases is 53,761.2. The net order value is USD 1,390,121,425.00.3. The number of variants selected is 7.4. The percentage of the total variance explained at 7 is 87.3%. Seven variants were selected because it provides enough information to explain the majority of the deviations.

5. The seven specific variants that were selected are: Order, Delivery and Invoice, Check credit limit, Check material availability, Order release, Goods issue, and Invoice verification.6. Below is a table showing the percentage of cases and number of cases covered by each variant:VariantPercentage of casesNumber of casesOrder57.2%30,775Delivery and Invoice23.4%12,591Check credit limit5.1%2,757

Check material availability4.2%2,240Order release4.0%2,126Goods issue2.4%1,276Invoice verification1.7%9047. The duration of each variant is as follows:VariantDuration in daysOrder24Delivery and Invoice3Check credit limit2Check material availability1Order release2Goods issue4Invoice verification1

8. The largest number of sales/highest dollar volume was in January.9. The number of sales items was 256,384, and the dollar volume was USD 6,607,088.00.10. The distribution channel with the highest sales is Wholesale and the amount of sales is USD 3,819,864.00.

11. The distribution channel with the second-highest sales is Retail and the amount of sales is USD 2,167,992.00.12. The second-highest month of sales order is December.13. The automation rate for that month is 99.9%.14. The net order for Skin Care, V1, Plant W24 is USD 45,000.00.15.

The net order for Fruits, VV2, Plant WW10 is USD 43,935.00.16. The number of the most common path’s KPI is 4.17. The average days of the most common path’s KPI is 1.8 days.18. Additional information that can be obtained from this tab includes process discovery, process conformance, and process enhancement.

19. The first name that appears on the Social Graph is Bob.20. The number of cases routed to Bob at the Process Start is 11,106.

For more such questions deviations,Click on

https://brainly.com/question/24251046

#SPJ8

Complete each of the following sentences by selecting the correct answer from the list of options.

The CPU converts
into information.

The CPU is the mastermind of the computer, controlling everything that goes on through a series of
.

Another name for the CPU is
.

Answers

The CPU converts instructions and data into information. The CPU is the mastermind of the computer, controlling everything that goes on through a series of electrical signals and calculations.

The CPU, or central processing unit, is the primary component of a computer that performs most of the processing inside the computer. It is often referred to as the "brain" of the computer.

The CPU interprets and executes instructions, performs calculations, and manages the flow of data within the computer system. It is responsible for coordinating and controlling the activities of other hardware components, such as memory, storage, and input/output devices, to carry out tasks and run programs.

Learn more about CPU on:

https://brainly.com/question/21477287

#SPJ1

When a computer is suffering from a virus, you can use a compiler to help remove the virus. True or false?

Answers

True I think because it helps right?

It is true that when a computer is suffering from a virus, you can use a compiler to help remove the virus.

What is a compiler?

Compilers are specialized software tools that convert the source code of one programming language into machine code, bytecode, or another programming language.

Usually, the source code is created in a high-level, readable language for humans, such Java or C++.

Programs that convert source code from a high-level programming language to a low-level programming language (such as assembly language, object code, or machine code) in order to produce an executable program are commonly referred to as "compilers."

The compiler, as we well know, transforms high-level source code into low-level code.

Low-level code is then executed on the target system. You can use a compiler to assist in virus removal when a computer is infected.

Thus, the given statement is true.

For more details regarding a compiler, visit:

https://brainly.com/question/28232020

#SPJ2

Use the drop-down menus to complete statements about how to use the database documenter

options for 2: Home crate external data database tools

options for 3: reports analyze relationships documentation

options for 5: end finish ok run

Use the drop-down menus to complete statements about how to use the database documenteroptions for 2:

Answers

To use the database documenter, follow these steps -

2: Select "Database Tools" from   the dropdown menu.3: Choose "Analyze"   from the dropdown menu.5: Click on   "OK" to run the documenter and generate the desired reports and documentation.

How is this so?

This is the suggested sequence of steps to use the database documenter based on the given options.

By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.

Learn more about database documenter at:

https://brainly.com/question/31450253

#SPJ1

it is important organic mineral that is found in the soil as ash​

Answers

Answer:

Calcium is the most abundant element in wood ash and gives ash properties similar to agricultural lime. Ash is also a good source of potassium, phosphorus, and magnesium.

Huh this is very confusing

Shelly recorded an audio composition for her presentation. Arrange the following steps that Shelly followed in the proper order.

She added effects to her audio composition.
She saved her audio composition on an optical drive.
She connected her microphone to her computer.
She saved the audio composition in an appropriate file format.
She selected the record option in her DAW.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Shelly recorded an audio composition for her presentation. She needs to follow the following proper orders to get composition done for her presentation.

She connected her microphone to her computer.She selected the record option in her DAW.She added effects to her audio composition.She saved the audio composition in an appropriate file format.She saved her audio composition on an optical drive.

Answer:

She connected her microphone to her computer.

She selected the record option in her DAW.

She added effects to her audio composition.

She saved the audio composition in an appropriate file format.

She saved her audio composition on an optical drive.

What are 3 of the most important things about internet safety that you would recommend and why

Answers

Answer:

1. Protect Your Personal Information With Strong Passwords

2. Pay Attention to Software Updates

3. Make Sure Your Devices Are Secure

Explanation:

Protect Your Personal Information With Strong Passwords because you don't want anyone getting a hold of your personal information.

Pay Attention to Software Updates because you want to make sure that they aren't fake and what is being updated. So that you don't get a virus and your information is stolen.

Make Sure Your Devices Are Secure because you don't want anyone tricking you into getting your information.

PowerPoint is a visual aid for many speakers. Discuss some points to remember when adding text to a PowerPoint presentation. How do they help make the experience better for the audience and the presenter? What things can you do when creating a PowerPoint presentation to assure that your work adds to the speaker’s presentation without detracting attention from the speaker?

Answers

Answer:

Use a lot of spinning animations to draw attention. Use many colors. A lot of text so you can read from the slide in case you get lost.

WHICH OF THE FOLLOWING TASKS ARE PART OF THE SOFTWARE EVALUATION PROCESS?
TESTERS...

Answers

With regard to software evaulation, note that the correct options are -

Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.

How is this so?

The tasks that are part of the software evaluation process include  -

Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.

Tasks not directly related to the software evaluation process are  -

Software developers writing code line by line.Creating a design for the software program.

Learn more about software evaluation at:

https://brainly.com/question/28271917

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Choose all that apply: Which of the following tasks are part of the software evaluation process?

testers check that the code is implemented according to the specification document

an specification document is created

software developers write code line by line

any issues with the software are logged as bugs

bugs are resolved by developers

a design for the software program is created

3 ways that can be used to connect computers to a network

Answers

Answer:

Internet

The Internet is the most commonly used network technology with billions of daily users throughout the world.

Local Area Network

A Local Area Network (LAN) connects two or more computers together via Ethernet cables.

Wireless Area Network

A Wireless Area Network (WAN) has the same function of connecting computers on a home or office network as a LAN, but it distributes the signal wirelessly.

hope it helps (^^)

# Cary on learning

: "I have a customer who is very taciturn."

: "I have a customer who is very taciturn."

Answers

The client typically communicates in a reserved or silent manner

B. He won't speak with you.

Why are some customers taciturn?

People who are taciturn communicate less and more concisely. These individuals do not value verbosity. Many of them may also be introverts, but I lack the scientific evidence to support that assertion, so I won't make any inferences or make conclusions of that nature.

The phrase itself alludes to the characteristic of reticence, of coming out as distant and uncommunicative. A taciturn individual may be bashful, naturally reserved, or snooty.

Learn more about taciturn people here:

https://brainly.com/question/30094511

#SPJ1

How did the use of ARPANET change computing?

Scientists were able to communicate over large distances.

Scientists could use computers that had different operating systems.

Computers no longer had to be wired to a main computer to communicate.

Scientists were able to connect to the World Wide Web through ARPANET.

Answers

The use of ARPANET changed computing because:

Scientists were able to communicate over large distances.Scientists could use computers that had different operating systems.Computers no longer had to be wired to the main computer to communicate.

ARPANET was developed by the United States Advanced Research Projects Agency.

The main reason for the creation of ARPANET was to make it easier for people to be able to access computers. Also, it was vital as it helped improve computer equipment and was a vital method for communication in the military.

Furthermore, it helped in communicating over large distances and ensured that scientists could use computers that had different operating systems.

In conclusion, it was also vital as computers no longer had to be wired before they can communicate.

Read related link on:

https://brainly.com/question/15980664

Answer:

A B and C

Explanation:

Scientists were able to communicate over large distances.

Scientists could use computers that had different operating systems.

Computers no longer had to be wired to a main computer to communicate.

Which option determines the number of pages, words, and characters in a
document?
View Print Layout
File > Properties
Tools > AutoCorrect
Tools Word Count

Answers

View>print layout because it just makes sense

13./ Write a java program to input an integer N and compute its factorial. Print the number and the factorial.
The factorial is calculated by multiplying all the integers from the number upto 1. For example: factorial of
4 (4!) is : 4 x 3 x 2 x 1 = 24 or 4! = 1 x 2 x 3 x 4 =24.
\(write \: a \: java \: program\)

Answers

Answer:

Código Java de forma recursiva que nos ayuda a calcular el factorial de ... El factorial de un número es la multiplicación de los número que van del ... Para expresar el factorial se suele utilizar la notación n! ... mayo 5, 2010 - 4:13 am ... un programa q de un numero dado en arabigo o romano lo imprima ya

Explanation:

Espero te sirva!!

Process whereby data are written to magnetic storage Location as a temporary file pending the time it will be ready for processing is known as ___​

Answers

Process whereby data are written to magnetic storage Location as a temporary file pending the time it will be ready for processing is known as buffering.

How information is put away on attractive capacity gadgets?

Buffering is the hone of pre-loading fragments of information when gushing video substance. Spilling  is the persistent transmission of sound or video records from a server to a client  is is the method that creates observing recordings online conceivable.

Attractive capacity media and gadgets store information within the frame of modest charged dabs. These dabs are made, examined and deleted utilizing attractive areas made by exceptionally minor electromagnets.

Learn more about magnetic storage from

https://brainly.com/question/13454506

#SPJ1

the conceptual framework provides to financial reporting, but it does not tyr to prescribe what us gaap is

Answers

The conceptual framework provides to finance report, however it doesn't try to prescribe the GAAP because is: They provide as a frame of reference for assessing current practices and creating new ones.

Many disciplines can use conceptual frameworks, but when specifically applied to financial reporting, they can be thought of as a declaration of generally accepted accounting principles (GAAP) that serves as a frame of reference for assessing current practices and developing new ones. The basics are the underlying ideas that support the achievement of the objectives, which are aims and purposes of financial reporting that are identified by the objectives.

Learn more about framework GAAP: https://brainly.com/question/13215024

#SPJ4

What is output by the following code? Select all that apply.

c = 0
while (c < 11):
c = c + 6
print (c)

Answers

When the above code is entered into the Python online compilers and run, the output is 12.

What is an online compiler?

An online compiler is a technology that allows you to build and run source code in a variety of computer languages online. For program execution, an online compiler is required. It translates the text-based source code into an executable form known as object code.

The print() function sends the specified message to the screen or another output device. The message can be a string or another object that is converted to a string before being shown on the screen.

Hence, where:

c = 0

while (c < 11):

 c = c + 6

print (c)

Output = 12

Learn more about compilers:
https://brainly.com/question/27882492
#SPJ1

Other Questions
Tyler has more than $10. Elena has more money than Tyler. Mai has more money than Elena. Let t be the amount of money that Tyler has, let e be the amount of money that Elena has, and let m be the amount of money that Mai has. Select all statements that are true: Which of the following is a valid conclusion about the data? a person with organic brain impairment would most likely have difficulty completing: Gas exchange involves the transport of two respiratory gases, oxygen and carbon dioxide. Review how each gas is transported between the atmosphere and the cells of your body by completing this exercise. Drag each statement into the appropriate bin depending on whether it applies to oxygen only, carbon dioxide only, or both oxygen and carbon dioxide. Daryl picks berries at a constant rate. By 1:00 p.m. he has picked 300 berries, and by 3:00 p.m. he has picked 350 berries. what is the rate which Daryl picks berries in berries per hour? what is the rate at which Daryl picks berries in berries per minute? alex developed a secure attachment to his parents when he was a child. alex probably characterizes his most important adult love relationship in terms of Saar sets a password to gain access to his phone. His little brother figures it out and gets into his apps. Which part of the CIA triad was broken? Tenochtitlan was the capital of what ancient civilization located in the western hemisphere? what could the melting of glaciers cause? the answers are a- more fresh water b- calmer weather c- coastal flooding d- an increase in the birth rate Which property of multiplication is shown? (c + d): f= c.f+ d. f ide nity commutative associative distributive Submit Create a list of rights that you think that you hace. Then identify 3 that you think are the most important In a campaign speech, the author's purpose is usually to:A)PersuadeB)InformC)Entertain Here is a data set: 22, 4, 26, 31, 33, 24.Answer true or false for the following statements.If you remove the outlier: = 4- the range will decrease:- the mean will increase:- the median will stay the same: What was the impact of the crop lien program on farmers economic recovery?It allowed farming to continue, but failed to positively impact economic recovery because of the debt accompanying the lien.It allowed farmers to make a huge profit and repay the large accompanying debt.It failed due to the huge accompanying debt, but farmers were able to secure other successful loans and recover.It led to farmers making small gains because the accompanying debt was minor. which number is irrational an integer and a real number?A.0 B. there is no such number C.-4/2 D. 4 Todd and Garrett began arguing about who did better on their tests, but they couldn't decide who did better given that they took different tests. Todd took a test in Math and earned a 74.6, and Garrett took a test in English and earned a 68.8. Use the fact that all the students' test grades in the Math class had a mean of 70.6 and a standard deviation of 11.9, and all the students' test grades in English had a mean of 63.7 and a standard deviation of 8.6 to answer the following questions. Required:a. Calculate the z-score for Todd's test grade.b. Calculate the z-score for lan's test grade.c. Which person did relatively better? Mitha and her roommates made a spinner to help them assign daily chores. Every day, they each spin the wheel and do the chore the spinner lands on. The spinner is set up like the one below with 666 equally-sized spaces. Half of the spaces correspond to bathroom chores. There are 222 spaces corresponding to kitchen chores and 111 space for a living area chore. Let A be the set of all lines in the plane. Define a relation R on A as follows. For every l1 and l2 in A, l1 R l2 l1 is parallel to l2. (Assume that a line is parallel to itself). Which of the following is true for R? A. R is reflexive. B. R is symmetric. C. R is transitive. D. R is neither reflexive, symmetric, nor transitive. Describe the organization of American political parties. How do party politics at the local, state, and national level differ The US Constitution Scavenger HuntDirections: Use the United States Constitution and class handouts to answer each of the following questions.Constitution Scramble (6 Points)Put these parts of the Constitution in order of appearance (1-6, 1 coming first, 6 being the last)Article II: The Preamble: Bill of Rights:Article I: Amendment 14:Article III:Article I (10 Points)Search Article I and answer the following questions:Which branchs powers are described in Article I (Legislative, Executive, or Judicial)?How old must someone be to become a Representative?How many years is the term in the House of Representatives?How many Senators are there from each state?Who is the President of the Senate?Article II (6 Points)Search Article II and answer the following questions:Which branchs powers are described in Article II (Legislative, Executive, or Judicial)?In order to be President, how many years must someone be a resident of the United States?What would a President have to be convicted of in order to be impeached and removed?Article III (4 Points)Search Article III and answer the following questions:Which branchs powers are described in Article III (Legislative, Executive or Judicial)?How long is a term in office for a Supreme Court Justice (judge)?