what benefit can we get form using computer in education?
Write the command and explain about each formula in MS Excel
1. SUM
2. AVERAGE
3. MAx
4. MIN
5. COUNT
Answer:
1. SUM --- The SUM function is used to sum all the values that are in a given range. Thus, for example, if you want to add the values between cells A1 and A3, you must write the following command: =SUM(A1:A10)
2. AVERAGE --- The AVERAGE function allows you to average a range of values, throwing the average of these values in the cell where the function is typed. For example, if you want to average the values included between B1 and B3, you should write the following function: =AVERAGE (B1: B3).
3. MAX --- The MAX function, for its part, returns the maximum value of the values included in the function. For example, if the maximum value included between the values C1 and C3 is known, the following function must be written: =MAX (C1: C3).
4. MIN --- The MIN function, in turn, allows to identify the minimum value of the range of values included in the function. For example, if the minimum value included between the values D1 and D3 is known, the following function must be written: =MIN (D1: D3).
5. COUNT --- The COUNT function, finally, is used to count all the cells that have numbers, which have been included in the range of the function. For example, if you want to count all cells that contain numbers between the values E1 and E3, you must write the following function: =COUNT (E1: E3).
Gamification and virtual reality is the future of education
Answer:
Education is expected to be the fourth largest sector for VR investment. VR in education is predicted to be a $200 million industry by 2020, and a $700 million industry by 2025. 97% of students would like to study a VR course.
Explanation:
Social media marketing began in the mid
1970s
1980s
1990s
2000s
Answer:
1990's i think
Explanation:
Write a class called TextProcessor that implements the methods listed below. Your implementation may use the charAt() and length() methods from the String class You must not use any other String methods, and you must not use any of the methods in the Character class. You may not use any integer literal values except for 0 and 1.
A Process of receiving selecting
organizing interpreting checking and
reacting to sensory stimuli or data
so as to form a meaningful and
coherent picture of the world is
Select one:
a. Attitude
b. Perception
c. Communication
d. Thinking
= Perception
Answer:
I think it’s B based on the answer choices
Explanation:
Identify the correct characteristics of Python lists. Check all that apply. Python lists are enclosed in curly braces { }. Python lists contain items separated by commas. Python lists are versatile Python data types. Python lists may use single quotes, double quotes, or no quotes.
Answer:
Python lists contain items separated by commas.
Python lists are versatile Python data types.
Python lists may uses single quotes, double quotes, or no quotes.
Explanation:
Python Lists are enclosed in regular brackets [ ], not curly brackets { }, so this is not a correct characteristic.
Answer:
a c d
Explanation:
How to do brainliest
6.2 lesson practice
Answer:
I am guessing it would be 20
Explanation:
In the draw canvas text code the last number from the color is probably the font size.
Correct me if I'm wrong
III. FILL-IN THE BLANK (five points each)
11. Open divided scales have scales going in
directions.
12. There are
groups of scales.
13. The open divided scales have an
unit preceding zero.
14. The triangular scale can have up to
different scales on one piece of plastic.
15. The mechanical inch is divided into
equal parts.
The measure of software complexity that measure how complex a software is in machine's viewpoint in terms of how the size of the input data affects an algorithm's usage of computational resources is known as Computational Complexity.
a. True
b. False
Answer:
a. True
Explanation:
In Computer science, an algorithm can be defined as a standard formula or procedure which comprises of set of finite steps or instructions for solving a problem on a computer.
Basically, the time complexity of an algorithm is defined by f(n) if; for all "n" and all inputs with length "n" the execution of the algorithm takes a maximum of f(n) steps. Therefore, this is a measure of the efficiency of an algorithm.
Hence, the time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the inpu
Computational complexity can be defined as a measure of software complexity that measure how complex a software is in machine's viewpoint in terms of how the size of the input data affects an algorithm's usage of computational resources such as memory or running time.
Select the correct answer. Why is it important to identify your audience while making a presentation? A. It helps you define the time limit and number of slides required in the presentation. B. It helps you adapt the presentation to the appropriate level and complexity. C. It helps you establish whether you require a conclusion in your presentation. D. It helps you decide how much practice you need for the presentation.
Answer:B
Explanation:
What email program would you suggest and why?
Answer:
An email program
Explanation:
And why?
Answer:
I would suggest g m a i l.
Explanation:
I use G m a i l all the time and I think it is easy to use! A lot of people think it is great too! :)
sadfsdfsdfasdfsafdsafaf
Design a flowchart for an algorithm which adds prim numbers starting from 1 up to 50. Change
the flow chart to a pseudocode.
Answer:
Explanation:. ALGORITHM AND FLOW CHART. 1.1 Introduction. 1.2 Problem Solving ... money. After knowing the balance in his account, he/she decides to with draw the ... change it to a sports channel, you need to do something i.e. move to that channel by ... Problem4: Design an algorithm with a natural number, n, as its input which.
Consider the following method, inCommon, which takes two Integer ArrayList parameters. The method returns true if the same integer value appears in both lists at least one time, and false otherwise.
public static boolean inCommon(ArrayList a, ArrayList b)
{
for (int i = 0; i < a.size(); i++)
{
for (int j = 0; j < b.size(); j++) // Line 5
{
if (a.get(i).equals(b.get(j)))
{
return true;
}
}
}
return false;
}
Which of the following best explains the impact to the inCommon method when line 5 is replaced by for (int j = b.size() - 1; j > 0; j--) ?
A. The change has no impact on the behavior of the method.
B. After the change, the method will never check the first element in list b.
C. After the change, the method will never check the last element in list b.
D. After the change, the method will never check the first and the last elements in list b.
E. The change will cause the method to throw an IndexOutOfBounds exception.
Answer:
The answer is "Option b".
Explanation:
In the given code, a static method "inCommon" is declared, that accepts two array lists in its parameter, and inside the method two for loop is used, in which a conditional statement used, that checks element of array list a is equal to the element of array list b. If the condition is true it will return the value true, and if the condition is not true, it will return a false value. In this, the second loop is not used because j>0 so will never check the element of the first element.
Differentiate between Calling and Called program?
Answer:
The program name in CALL statement called as CALLED program/Sub program. A program can contain as many CALLs required and no restriction on it. In other words, CALLING program can CALL as many subprograms required. CALLED may not have the CALL statement to call another program.
Explanation:
I need help, who is a great phone pin lock screen cracker?
Answer:
738159
now it's depend on you.
What are the words that make up a high-level programming language called?
Answer:
just ask your teacher
Explanation:
Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network compromises.
a. True
b. False
Answer: True
Explanation:
The Intrusion Detection System (IDS) is used for the detection of malicious activities and thus is done by monitoring if the network communications and also the examination of systems logs.
When something looks suspicious of fishy, the Intrusion Detection System scans such thing out. When violations of policy occurs, the Intrusion Detection System is at alert to notice.
Therefore, the answer to the statement in the question is true.
compare and contrast Charles bebbage and Blaise Pascal inventions
Explanation:
A computer might be described with deceptive simplicity as “an apparatus that performs routine calculations automatically.” Such a definition would owe its deceptiveness to a naive and narrow view of calculation as a strictly mathematical process. In fact, calculation underlies many activities that are not normally thought of as mathematical. Walking across a room, for instance, requires many complex, albeit subconscious, calculations. Computers, too, have proved capable of solving a vast array of problems, from balancing a checkbook to even—in the form of guidance systems for robots—walking across a room.
Before the true power of computing could be realized, therefore, the naive view of calculation had to be overcome. The inventors who laboured to bring the computer into the world had to learn that the thing they were inventing was not just a number cruncher, not merely a calculator. For example, they had to learn that it was not necessary to invent a new computer for every new calculation and that a computer could be designed to solve numerous problems, even problems not yet imagined when the computer was built. They also had to learn how to tell such a general problem-solving computer what problem to solve. In other words, they had to invent programming.
They had to solve all the heady problems of developing such a device, of implementing the design, of actually building the thing. The history of the solving of these problems is the history of the computer. That history is covered in this section, and links are provided to entries on many of the individuals and companies mentioned. In addition, see the articles computer science and supercomputer.
Early history
Computer precursors
The abacus
The earliest known calculating device is probably the abacus. It dates back at least to 1100 BCE and is still in use today, particularly in Asia. Now, as then, it typically consists of a rectangular frame with thin parallel rods strung with beads. Long before any systematic positional notation was adopted for the writing of numbers, the abacus assigned different units, or weights, to each rod. This scheme allowed a wide range of numbers to be represented by just a few beads and, together with the invention of zero in India, may have inspired the invention of the Hindu-Arabic number system. In any case, abacus beads can be readily manipulated to perform the common arithmetical operations—addition, subtraction, multiplication, and division—that are useful for commercial transactions and in bookkeeping.
The abacus is a digital device; that is, it represents values discretely. A bead is either in one predefined position or another, representing unambiguously, say, one or zero.
Analog calculators: from Napier’s logarithms to the slide rule
Calculating devices took a different turn when John Napier, a Scottish mathematician, published his discovery of logarithms in 1614. As any person can attest, adding two 10-digit numbers is much simpler than multiplying them together, and the transformation of a multiplication problem into an addition problem is exactly what logarithms enable. This simplification is possible because of the following logarithmic property: the logarithm of the product of two numbers is equal to the sum of the logarithms of the numbers. By 1624, tables with 14 significant digits were available for the logarithms of numbers from 1 to 20,000, and scientists quickly adopted the new labour-saving tool for tedious astronomical calculations.
Most significant for the development of computing, the transformation of multiplication into addition greatly simplified the possibility of mechanization. Analog calculating devices based on Napier’s logarithms—representing digital values with analogous physical lengths—soon appeared. In 1620 Edmund Gunter, the English mathematician who coined the terms cosine and cotangent, built a device for performing navigational calculations: the Gunter scale, or, as navigators simply called it, the gunter. About 1632 an English clergyman and mathematician named William Oughtred built the first slide rule, drawing on Napier’s ideas. That first slide rule was circular, but Oughtred also built the first rectangular one in 1633. The analog devices of Gunter and Oughtred had various advantages and disadvantages compared with digital devices such as the abacus. What is important is that the consequences of these design decisions were being tested in the real world.
Digital calculators: from the Calculating Clock to the Arithmometer
In 1623 the German astronomer and mathematician Wilhelm Schickard built the first calculator. He described it in a letter to his friend the astronomer Johannes Kepler, and in 1624 . .
What effect would excluding quotation marks from a search phrase have?
A.
It would narrow down the search.
B.
It would have little or no impact on the search.
C.
It would broaden the search.
D.
It would cause the search engine to bring up very different results.
Answer: C
it would broaden the search
Explanation:
Placing quotation marks around a search term or phrase limits your search to that exact term or phrase. Without the quotes, your search engine may return all results that contain each separate word. Placing AND between your keywords will return results that only include both or all your keywords.
Answer:
The answer is C. It would broaden the search.
Explanation:
I got it right on the Edmentum test.
The divBySum method is intended to return the sum of all the elements in the int array parameter arr that are divisible by the int parameter num. Consider the following examples, in which the array arrcontains {4, 1, 3, 6, 2, 9}.
The call divBySum(arr, 3) will return 18, which is the sum of 3, 6, and 9, since those are the only integers in arr that are divisible by 3.
The call divBySum(arr, 5) will return 0, since none of the integers in arr are divisible by 5.
Complete the divBySum method using an enhanced for loop. Assume that arr is properly declared and initialized. The method must use an enhanced for loop to earn full credit.
/** Returns the sum of all integers in arr that are divisible by num
* Precondition: num > 0
*/
public static int divBySum(int[] arr, int num)
Answer:
The complete method is as follows:
public static int divBySum(int[] arr, int num){
int sum = 0;
for(int i:arr){
if(i%num == 0)
sum+=i;
}
return sum;
}
Explanation:
As instructed, the program assumes that arr has been declared and initialized. So, this solution only completes the divBySum method (the main method is not included)
This line defines the method
public static int divBySum(int[] arr, int num){
This line declares and initializes sum to 0
int sum = 0;
This uses for each to iterate through the array elements
for(int i:arr){
This checks if an array element is divisible by num (the second parameter)
if(i%num == 0)
If yes, sum is updated
sum+=i;
}
This returns the calculated sum
return sum;
}
Write a program that reads an integer between o and 1000 and adds all the digits in the integer. For example, if an integer is 932, the sum of all the digits is 14. Hint: Use the % operator to extract digits, and use the / operator to remove the extracted digit. For instance, 932 % 10=2 and 932/10 =93. Here is a sample run:
Enter a number between 0 and 1000 : 999
The sum of digits is 27.
Answer:
Answered below
Explanation:
#Program is written in Python programming language
digit = 0
sum = 0
num = int(input("Enter a number between 0 and 1000: ")
#Check that number is within the valid range
if num > 0 and num <= 1000:
while num != 0:
#Isolate each digit
digit = num % 10
sum = sum + digit
#Remove isolated digit from number
num = num/10
else:
print("Number is not within valid range")
#print total sum of digits
print(sum)
Why is it important to know how to create a professional email?
So people think you are professional based on what you write.
Answer:
It is important to write a professional email because you need to make a good impression. This also shows that you are determined.
Why are object-oriented languages very popular?
They can use flowcharts.
They can use pseudocode.
They are powerful, clear, and efficient.
They don't use binary.
Answer: I don't know the Choices but I can give u an example.
Explanation:
Other advantages of object-oriented programming languages are you can use it to kinds of web applications for thorough data analysis, less development time, accurate coding, easy testing, reusability, debugging, less data corruption, and maintenance.
Answer:
They are powerful, clear, and efficient.
Explanation:
Quick please, URGENT
1.Explain why the scenario below fails to meet the definition of due diligence in coding.
Situation: As you are developing an app for a small fee, you include access to many other services, such as searching the Internet.
3.A programmer must know platforms and other languages. On what "side" is Groovy?
programmer side
Web-based side
server-side
client-side
4.Give two reasons why there are more contract workers than permanent workers
5.Explain why the scenario below fails to meet the definition of an app with persona.
Situation: Jim built an app for a company in which the user navigates a Web site by clicking on links and reading written material.
6.Explain why the scenario below is not a description of an angel investor.
Situation: Ray has an idea for developing an app and finds individuals who will invest in the app. These individuals sign an agreement that they expect no money or rights in the app.
7.In an app design project, who is responsible for the SDKs?
the programmer
the developer
the senior executive
the senior staff
8.Suppose you are offered a position that focuses on writing policies, hiring staff, and focusing on the company's mission. What position are you offered?
legal executive
technology executive
resources executive
programming executive
Answer: it is the code it is wrong
Explanation:
attribute variables have the same meaning as participants variables. is this true or false?
Answer:
true
Explanation:
because I said so dude
You have an image of building but there are people standing on the far left side. You would like to remove those people. Which tool do you need ?
Answer:
cropping tool
Explanation:
since the people are on the far left you can just crop the image
In which type of network will a problem with one computer crash the network?
mesh
ring
star
bus
Answer:
Probably a mesh since they daisy chain off one another. If one in the middle crashes, there is a disconnect of all the ones following it.
Answer:
bus + ring
Explanation:
edge 2021 :)