Which objects appear on the slide after she clicks OK? Check all that apply.
A fully completed table
A fully completed chart
A table with blank values
A chart with blank values
A table with sample values
A chart with sample values

Answers

Answer 1

Answer:

table w samples and a chart w samples

Explanation:

Answer 2

Answer:

A table with sample values

A chart with sample values

Explanation:

Answers green checked on E.


Related Questions

What is a brute force attack? What are the ways you can make it harder for someone to use crack your credentials using a brute force attack?

Answers

Explanation:

A brute attack is a method of cracking someone's password/credentials using a predefined set or list of commonly used passwords or from a database leak.

We can prevent our passwords from being brute forced by using a combination of password with no dictionary words and using many symbols and numbers with both upper and lower case characters.

The holding capacity of working memory is often said to be _______. a) 7 digits
b) 7 chunks
c) 15 digits
d) 15 chunks

Answers

The holding capacity of working memory is often said to be "7 chunks." The holding capacity of working memory is often said to be b) 7 chunks.

Memory is a computing term for a system or device that stores data for immediate use in a computer, computer hardware, or other digital electronic devices. The terms main memory and primary storage are frequently used interchangeably. Store is a dated word for memory.

Compared to slower, cheaper, and higher capacity storage, computer memory operates at a high speed. Computer memory serves as a disc cache and write buffer in addition to storing opened programmes to enhance reading and writing performance. When running software is not using RAM, operating systems use it for caching.

Visit here to learn more about memory  : https://brainly.com/question/28698996
#SPJ11

the first section of an html document is called the ____ section.

Answers

The first section of an HTML document is called the "head" section.

In HTML, the structure of a web page is divided into different sections. The head section is the first section of an HTML document and is typically located between the opening <html> tag and the opening <body> tag. It contains metadata and other elements that provide information about the webpage, such as the title, character encoding, and external resources like CSS stylesheets and JavaScript files.

The head section is not displayed directly on the webpage but is essential for defining the document's properties and providing instructions to the browser on how to render and process the content.

You can learn more about HTML document at

https://brainly.com/question/9069928

#SPJ11

When using another worksheet as a starting point, will all the data from it stay the same?

Answers

When using another worksheet as a starting point, it depends on how you copy or reference the data. If you simply copy and paste the data from the original worksheet to the new worksheet, then the data will stay the same. However, if you reference the data from the original worksheet in the new worksheet, any changes made to the original data will also be reflected in the new worksheet.



In Excel, there are two ways to reference data from another worksheet: using the cell reference or using a formula. When you use the cell reference method, you select the cell in the original worksheet and copy it to the new worksheet. This method creates a direct link between the cells, so any changes made to the original data will be reflected in the new worksheet.

On the other hand, if you use a formula to reference the data, you create a dynamic link between the two worksheets. This means that any changes made to the original data will be updated automatically in the new worksheet. However, this method requires more time and effort to set up and can be more complex to manage.

Overall, whether the data stays the same or changes when using another worksheet as a starting point depends on how you copy or reference the data. It is important to understand the different methods and choose the one that best suits your needs.

Learn more about Excel here:

https://brainly.com/question/30324226

#SPJ11

write a note on secondary storage​

Answers

Answer:  Storage devices are non-volatile devices. That means that when the power is removed from them, for example, when you switch your computer off, they retain their contents (unlike RAM, which is volatile – it loses its contents). You can then retrieve the contents next time you switch your computer on. Storage devices can be used to hold operating systems, applications and files, amongst other types of software. They are simply big suitcases – used only for storage. We have already seen that when you want to use an application kept on a storage device, it has to be moved to RAM before you can start using it. This applies to the operating system, your files and any other category of software. For this reason, RAM is sometimes known as Primary Memory whereas storage devices are often referred to as Secondary Storage devices.

write a recursive, int-valued method, len, that accepts a string and returns the number of characters in the string. the length of a string is:

Answers

The recursive method "len" can be implemented to calculate and return the number of characters in a given string.

The "len" method can be designed to recursively determine the length of a string. Here's how the implementation would work:

Base Case: If the input string is empty or has no characters, the method should return 0, indicating that the length is zero.

Recursive Case: If the input string is not empty, the method can invoke itself recursively by passing the substring starting from the second character till the end. The length of the string is then determined by adding 1 to the result of the recursive call.

By repeatedly invoking the "len" method on smaller and smaller substrings of the input string, the method eventually reaches the base case and starts returning the length. Each recursive call contributes 1 to the total length until the entire string is processed.

This recursive approach effectively counts the number of characters in a string by breaking down the problem into smaller subproblems and solving them iteratively until reaching the base case.

Learn more about string here:

https://brainly.com/question/32338782

#SPJ11

Kirstie needs a computer for word processing, emailing, downloading high definition TV
series from an online store and basic photo editing.
Which computer would you recommend for Kirstie? Give reasons for your answer.

Answers

NmmkkjdijdjrjrjdjirjrkdidiL028

It is important to analyze the sources and uses of cash because:___.

Answers

It is important to analyze the sources and uses of cash because creditors use this information to assist them in deciding whether to loan funds to them. Investors use this information to decide if they will purchase their stock.

Managing your revenue is an important step to starting or investing in something.

Creditors always check and properly analyze the sources of cash before providing a loan to a lender. They do not invest in companies or people who are least likely to source and make cash in the coming time. Hence, your sources and uses shall be properly analyzed when presenting to creditors.

Investors, whenever investing in something will look at the benefits of the source they want to invest into. If a source is not likely to produce beneficiary revenue in the upcoming time, then investors will never invest in such a kind of source.

To learn more about investors, click here:

https://brainly.com/question/25311149

#SPJ4

In this unit, you learned that test generators can be very helpful when trying to determine if a code runs properly or fails in some situations. For example, let’s say that you were writing a program where the user would input their test grades and the program would tell them their average. What kinds of data would a test generator want to test for that program to be sure that it would work in all situations?

Answers

Answer:

Using boundary value analysis and assuming the valid range of test scores is [0 - 100],

min value, min value + 1-1 and 0A Nominal value between (0, 100)100 and 101max value - 1, max value

In Boundary value analysis, we test the transition points where the program's behavior is expected to change. These transition points are the boundaries of valid and invalid partitions.

Min and max value are the smallest and largest possible values that you can store in your data type being used. This varies depending on the data type, so without knowing which you are using (and which language), I can't be more specific.

What is a router?

a special computer designed to accomplish tasks
a device that sends data to the receiving device
a set of data sent across networks
an Internet site available only to members of a group

Answers

Answer:

The second one

Explanation:

Answer:

a) device that sends data to the receiving device

Explanation:

hope this helps

Computer science student Jones has been assigned a project on how to set up sniffer. What must he keep in mind as part of the process

Answers

Setting up a sniffer requires certain considerations to be taken into account, such as ensuring that the sniffer is being used legally, selecting the appropriate hardware and software for the task, and configuring the sniffer correctly to capture and analyze network traffic.

The use of a sniffer or packet analyzer can be subject to legal restrictions and ethical considerations, as capturing and analyzing network traffic may violate privacy laws or ethical norms. As such, Jones needs to ensure that the use of the sniffer is authorized and that he is aware of any legal or ethical considerations that may apply.

When selecting hardware and software for the sniffer, Jones should consider factors such as the intended use of the sniffer, the complexity of the network, and the level of analysis required. Different sniffer tools may be better suited for different tasks, such as capturing traffic on wired or wireless networks, analyzing specific protocols, or detecting security threats.

Once the hardware and software have been selected, Jones needs to configure the sniffer correctly to ensure that it is capturing the desired traffic and providing accurate results. This may involve setting filters to capture specific types of traffic, configuring the interface to ensure that packets are being captured properly, and adjusting the settings to optimize the performance of the sniffer.

To learn more about Sniffer, visit:

https://brainly.com/question/29872178

#SPJ11

A structure variable cannot be declared inside another structure. a. True b. False

Answers

The statement given "A structure variable cannot be declared inside another structure." is false because in programming languages such as C or C++, it is possible to declare a structure variable inside another structure.

This concept is known as nested structures or nested structs. Nested structures allow for the creation of more complex data structures that can hold multiple levels of related data.

For example, consider a scenario where you have a structure called "Employee" that contains various information about an employee such as name, age, and salary. Within the "Employee" structure, you can have another structure called "Address" that holds the employee's address details like street, city, and zip code. This way, you can organize and group related data together.

You can learn more about nested structures at

https://brainly.com/question/11608024

#SPJ11

Can someone please explain this issue to me..?

I signed into brainly today to start asking and answering questions, but it's not loading new questions. It's loading question from 2 weeks ago all the way back to questions from 2018.. I tried logging out and back in but that still didn't work. And when I reload it's the exact same questions. Can someone help me please??

Answers

Answer:

try going to your settings and clear the data of the app,that might help but it if it doesn't, try deleting it and then download it again

I haven’t been able to ask any questions in a few days, maybe there’s something wrong with the app

7. According to the Value Proposition of Dataiku, Dataiku enables teams to centralize AI initiatives from data to impact so that they can accomplish these. (Choose three. )

Code applications that perform extraordinary tasks

Upskill business analysts with visual tools that empower them to work with data

Provide a single place for developing, testing, and putting projects into production

Unify business, data, and IT teams to work together on AI projects

Answers

Dataiku is a powerful platform that provides businesses with the ability to centralize AI initiatives from data to impact. This enables teams to work together and achieve their goals in a collaborative manner

.

The value proposition of Dataiku is based on three key areas, which include unifying business, data, and IT teams to work together on AI projects.
The first area where Dataiku enables teams to work together is in unifying business teams. The platform provides a range of tools and features that allow business teams to work together and collaborate effectively. For example, the platform provides a centralized workspace where teams can access all the necessary data and tools needed to accomplish their objectives. This allows business teams to work together more efficiently and effectively, resulting in better outcomes.The second area where Dataiku enables teams to work together is in unifying data teams. The platform provides a range of features and tools that enable data teams to work together and collaborate effectively. For example, the platform provides a centralized data repository that enables data teams to access and share data more easily. This makes it easier for data teams to work together on projects and to achieve their objectives.Finally, the third area where Dataiku enables teams to work together is in unifying IT teams. The platform provides a range of features and tools that enable IT teams to work together and collaborate effectively. For example, the platform provides a centralized workspace where IT teams can access all the necessary data and tools needed to accomplish their objectives. This enables IT teams to work together more efficiently and effectively, resulting in better outcomes.

For such more questions on value proposition

https://brainly.com/question/14524046

#SPJ11

In what situations might you need to use a function that calls another function?

Answers

Answer:

Explanation:

It is important to understand that each of the functions we write can be used and called from other functions we write. This is one of the most important ways that computer programmers take a large problem and break it down into a group of smaller problems.

10. Version control is a way to store code files with a detailed history of every modification to that code. True or False
This is for computer programming, I’m having a really hard time in this class and I need some help with this question. Any incorrect or spam answers will be reported. Thanks in advance!

Answers

Answer:

true

Explanation:

I hope this helps

Name the substance you think is in the cylinder that you cannot see and prevents the plunger from going all the way in even when you push the plunger hard

Answers

The substance I think is in the cylinder that you cannot see and prevents the plunger from going all the way in even when you push the plunger hard is Air.

What do you feel as when one push the plunger?

When a person push on the plunger, the person can feel the air pushing it back. When a person has stop pushing, the air inside the syringe will tend to return to its normal size.

Note that there are a lot of ways to compress air. A person can do so by  squeezing  a specified volume of air into a smaller space.

Learn more about cylinder from

https://brainly.com/question/26806820

Write the code for a program that takes in an integer from the user and then calculates
the sum of all the numbers from 1 to the integer entered by the user. For example,
suppose the user entered the number 4; now, the output should be 10.

Answers

Answer:

Explanation:

#include<stdio.h>

#include<conio.h>

int main(){

int a,b=1,sum=0;

printf("Enter the number:");

scanf("%d",&a);

while(b<=a){

sum=sum+b;

b=b+1;

}

printf("The sum is %d\n",sum);

getch();

}

write an assembly program (data and code) that uses loop to read 10 numbers and output the largest of those two numbers, you can assume any length for those numbers.

Answers

An assembly program (data and code) that uses loop to read 10 numbers and output the largest of those two numbers is given below

Define a variable named "maximum".

Initialise maximum to 0 i.e., maximum = 0.

Start taking input of numbers

If inputed number > maximum, then change maximum to the number i.e.,

if(number > maximum)

then maximum = number

Repeat this 10 times(as we are taking 10 numbers in the input).

Once we take the input of all the numbers, "max" will contain the number which was maximum out of these 10 numbers.

Print max.

What is a program?

A computer program is a set of instructions written in a programming language that a computer can execute

The software includes computer programs as well as documentation and other intangible components. Source code refers to a computer program in its human-readable form.

Read more about assembly language here:https://brainly.com/question/13171889

#SPJ1

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

Can you write a story about any princess?
Mark brainiest. Please

Answers

Okay well here's a short one. The main problem in Cinderella is that she wants to go to the ball but her stepsisters prevent her from going because they wanna marry the prince-

Cinderella is a beautiful kind daughter sees the world upside down when her mother dies and so her father in pain marries another woman who is wicked and the name is "Lady Termaine" she has two cruel daughters who get so jealous so easily. The daughters are named Drizella & Anastasia.

Who is famous for his three laws of robotics?

Answers

Answer:

The Correct answer is Isaac Asimov

Explanation:

Science fiction already envisioned this problem and has suggested various potential solutions. They were designed to prevent robots harming humans.

the _____ function determines if any conditions in a logical test are true.

Answers

The "OR" function determines if any conditions in a logical test are true.

This function is commonly used in various programming languages and spreadsheet applications such as Excel. It evaluates multiple conditions (also known as expressions) and returns a "true" value if any one of the expressions is true. If none of the expressions are true, the OR function returns a "false" value.

The OR function plays a crucial role in decision-making processes within a program or spreadsheet. It allows users to create more complex logical tests, helping to identify specific scenarios or conditions that need to be addressed. For example, you might use the OR function to determine if a student has passed an exam based on multiple criteria, such as achieving a minimum grade in either a written test or a practical test.In programming languages like Python, the OR function is represented by the "or" keyword, whereas in Excel, you would use the "OR()" function with the required logical expressions enclosed within the parentheses.It's important to note that the OR function stops evaluating expressions once it encounters a true value, making it more efficient when working with large data sets or complex conditions.The OR function is a valuable tool for determining if any conditions in a logical test are true, allowing for more sophisticated decision-making in programming and spreadsheet applications.

For such more questions on logical test

https://brainly.com/question/14474115

#SPJ11

_______ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.

Answers

Answer:

Trojan horses

Explanation:

address on the internet ​

Answers

A device on the internet or a local network can be identified by its IP address, which is a special address.The rules defining the format of data delivered over the internet or a local network are known as "Internet Protocol," or IP.

Which two kinds of Internet addresses are there?

picture of an address found online Internet Protocol (IP) addresses are used to connect your network with the Internet.IP addresses come in two varieties: static and dynamic.In order to help you choose between static and dynamic IP addresses, this article compares their main characteristics. Using one of the several IP lookup programs that are readily available online is the quickest approach to start learning someone's IP address.There are tools available to enter an IP address and search for its free public registry results on websites A network address and a host (or local) address are the components of an internet address.With this two-part address, a sender can identify both the network and a particular host on the network.Each network that connects to another Internet network receives a distinct, official network address. While IP addresses do identify your whereabouts, they do not provide as much detail as a home address.Additionally, IP addresses will never disclose your name, phone number, or any other specific personal details. "Internet protocol" is referred to as IP.For any device connected to your network, your router IP serves as an identification number.For the router to recognize it and send data packets to it, a device (such as a computer or smartphone) needs to have an IP address.Your internet is what it is because of the data packets.

       To learn more about IP address refer

        https://brainly.com/question/21864346

        #SPJ1

if involved in a boating accident causing serious bodily injury or death while boating under the influence, the operator has committed a _____.

Answers

Answer:

a felony.

Explanation:

Got u brother :)

how to write a code snippet that iterates through all characters in the sentence with a for loop

Answers

To iterate through all characters in a sentence using a for loop in Python, you can follow the steps below:

1. First, define your sentence as a string variable. For example, you can use the following line of code to define the sentence: `sentence = "Hello, world!"`

2. Next, use the `len()` function to get the length of the sentence. This will help you to set the range of the for loop. For example, you can use the following line of code: `length = len(sentence)`

3. Now, use a for loop to iterate through all characters in the sentence. You can use the `range()` function to set the range of the for loop. For example, you can use the following line of code:

```
for i in range(length):
   print(sentence[i])
```

This will print each character in the sentence on a separate line.

Note: You can replace the `print()` function with any other function or operation that you want to perform on each character in the sentence.

To know more about  loop in Python visit:

https://brainly.com/question/23419814

#SPJ11

Which of the following is not a characteristic of a large database?
a) Optstore items in a filing cabinet.
b) Stores items in a computer such as music.
c) stores large amounts of items such as an online store.
d) can be used as a small recipe book.​

Answers

C is the correct answer

When you connect several home devices using a wireless router, what network topology are you using? A. bus B. mesh C. star D. ring

Answers

Answer:

Star Topology

Explanation:

Because the definition of Star Topoplogy is: In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn’t allow direct communication between devices, a device must have to communicate through hub. If one device wants to send data to other device, it has to first send the data to hub and then the hub transmit that data to the designated device.

in your own ideas what are the disadvantages of participating in a videoconference write your answer inside the circle​

Answers

Some disadvantages of taking part in a video-conference are:

1) Lack of communication from social cues (social cues are what we use to see if someone is in a good or bad mood)

2) There is a high chance of unstable network connection.

3) Technical and personal issues because not everyone is comfortable speaking on a video-conference platform.

4) It causes more stress due to the lack of organization when preparing meetings (because it’s so easy to just get on a device without preparing anything beforehand).

Hope this helped!
Other Questions
What are the FOUR ways a positive attitude could help you to avoid interpersonal conflict between you and people you meetafter school? I need help with these questions if your able to help tysm :) What is six hundred five thousandths in decimal form? the nurse administers acetaminophen 325 mg and codeine 30 mg orally to a patient reporting a severe headache. when should the nurse reassess the patient's pain? SOMEONE HELP ME PLEASE!!!!? Josh was able to type 496 words in 8 minutes. How many words can he type in 35 minutes? One conclusion made from various studies is that projective tests __________. A. Should not be used to solely assess one's personality B. Are considered a valid representation for a psychological test C. Are highly reliable form of psychological assessment D. Do not reveal any useful information about one's personality. Can someone pleaseee do this for me will mark brainliest, thanks, & 5 stars :)I just used all my points for this so pls no jokes or links 1Five friends went to the movies and each spent $5 on a ticket per movie and $2 on a bag of popcorn. They saw 2 movies. The movies also had a deal of pizza and a large bottle of soda for $12, which they split. How much did each friend pay for the movie trip and pizza? what percentage of the miami-dade co aoi soil map is listed as ""urban area""? Identify the form of communication in which an individual both speaks up for their rights and also takes others' rights and feelings into account.a.Assertive communicationb.Passive communicationc.Aggressive communicationd.Empathetic communication You are acquiring a 100,000 sq. ft. office building for $10 million at a 7% cap rate. Operating expenses are $8 per sq. ft. plus a management fee of $75,000, other income of $108,000 and a 5% vacancy rate. What is the gross potential rent?(A) $1,575,000(B) $1,565,263(C) $1,544,210(D) None of the above What was the primary economic activity in ancient EgyO farmingO manufacturingO miningO fishingIm timed btw!!! Use the method of Lagrange Multipliers to find any maximum or minimum values of the function f(x,y)=x2+y2 subject to the constraint xy=1. Which one is it I know its not 5 or 2 One of the general principles of psychoactive drugs is that____. Mark the complete sentences with an S and the sentence fragments with an F. what is the slope of 3,5 and -3,5 Proslavery settlers who came to kansas from missouri in the 1800s were known as abolitionists. border ruffians. free-soilers. bleeding kansas.. Calculate the length of the side BC. Using pythagoras