Answer: Data from multiple workbooks can be combined in a single step.
Explanation:
The Subtotal command allows the creation of groups automatically and common functions such as COUNT, SUM, and AVERAGE are used in the summarizing of data.
An advantage of using the Subtotal dialog box is that data from multiple workbooks can be combined in a single step. Therefore, the correct option is B.
Select the three reasons that the gaming industry is set to grow.
A) more colleges offering jobs in game design
B) a decrease in the average age of gamers
C) an expanding market on mobile phones
D) expanding markets in Asia
E) new accessories that will attract more players
Answer:
expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones
Explanation:
Drag each tile to the correct box.
Albert has some software on his system. Help him identify the software based on its functions.
database software
word processor
spreadsheet software
multimedia software
can be used to create tables with embedded calculations
arrowRight
can be used to edit .doc files
arrowRight
can be used to store data in ordered form
arrowRight
can play .mpg and .mp3 files
arrowRight
Answer:
1. Spreadsheet software.
2. Word processor.
3. Database software.
4. Multimedia software.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
Basically, the various type of softwares used on computers to perform specific functions include the following;
1. Spreadsheet software: it can be used to create tables with embedded calculations. A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.
2. Word processor: it can be used to format or edit .doc files. Some examples of word processors are Notepad, Microsoft Word, Sublime text, etc.
3. Database software: it can be used to store data in ordered form. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security. These records are stored and communicated to other data user when required or needed.
4. Multimedia software: it can play .mpg and .mp3 files. A multimedia software refers to a software that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc.
How did Avery and Garth most likely create their
diagrams?
O Avery used SmartArt and added a shape, whereas
Garth used four shapes.
O Avery used four shapes, whereas Garth used
SmartArt and added a shape.
O Both Avery and Garth used SmartArt and added a
shape.
O Both Avery and Garth used four shapes.
Help!!!
Why did Stephen Hawking stop playing hide and seek?
Answer:
because she keeps using a metal detector.
what is the most improved Android robot
Answer:
They are the humanoid robots.
You are calculating commissions for sales staff at work. Employees receive ten dollars for every item sold. Your boss also wants to know the grand total paid to all employees as commission. How would you set this up in an Excel workbook and would you use absolute references, relative references, or both?
Answer:
To find the grand total paid to all employees as commission, we note the following;
The amount received by employees as commission for each item sold, r = $10.00
The information the boss wants to know = The grand total paid to all employees as commission
Let 'n' represent the the total sales, we have;
The grand total commission = Total sales × Commission
1) On MS Excel, four columns are created, labelled, Serial number, Employee Name, Number of Items Sold, Commission
2) In the second row, in the cell under the Commission column heading, Input the formula '=(Cell reference of adjacent Number of Items Sold) × 10' in the cell
3) Copy the the above formula to all the cells in the Commission column by clicking on the cell containing the formula, moving the mouse to the bottom right corner of the cell, and when the mouse pointer changes to a cross sign, left click and hold and drag to all the cells in the column
4) Input the formula =SUM(Argument) in the blank cell below the created Commission list
Where;
Argument = The reference to the range of cells containing the values in the Commission column
5) The output of the =SUM formula is the grand total paid to employees as commission
Explanation:
The smallest piece of information a computer can store is
Answer:
bit
Explanation:
confia
One type of emerging technology that is used to track packages, manage inventory, and even identify pets is _____.
ASCI
EPD
Smart Card
RFID
Answer:
rfid
Explanation:
................
Answer:
e
Explanation:
e
Diana has created a graphic design portfolio for a major project. What kind of portfolio would increase Dlana's chances of getting selected?
OA
a portfolio with some case studies of her graphic design work
OB.
a portfolio with graphic designs in her favorite theme
Ос.
a portfolio containing contact numbers of references
OD.
a portfolio that emphasizes large images and many colors
OE. a portfolio that emphasizes her qualifications and experience
Answer:
Hello There!!
Explanation:
I believe the answer is O A. a portfolio with some case studies of her graphic design work.
hope this helps,have a great day!!
~Pinky~
Fill in the blanks
A dash is a human-readable description in the source code of a computer program
Python has dash standard data types
A dash contains items separated by commas and enclosed within square brackets
A dash consists of key-value pairs
dash cannot be changed and use parentheses
Answer:
1. Comment
2. Five (5).
3. Line.
4. Tuple; that
Explanation:
1. A comment is a human-readable description in the source code of a computer program. Thus, it's an annotation or description in the source code of a software program that is readable by humans.
2. Python has five (5) standard data types, these includes; number, string, list, dictionary and tuple.
3. A line contains items separated by commas and enclosed within square brackets i.e [ ]. Thus, it's simply an ordered collection of one or multiple data items.
4. A tuple consists of key-value pairs
that cannot be changed and use parentheses. For example, Newtuple = ("strawberry", "apple", "mango", "banana", "orange").
What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?
A.B2B - commerce
B.B2.B commerce
C. B2b digital transaction
D.B2B e - commerce
E. Non of the above
Answer:
c.B2b digital transaction
Explanation:
yan lang po sana makatulong
Edhesive lesson practice 8.3, question 5
Answer:
3
Explanation:
Following are the correct python code to find the length of the given parameter value.
Python code to find length:print(len("stuff"))#printing length
Output:
please find the attached file.
Program Explanation:
In the given python code a print method is used inside this a "len" method is used that accepts a string value in the parameter.Python has a built-in function called len(). It determines an object's length. A character length of a text string is returned by LEN.
Find out more about the length method here:
brainly.com/question/13527881
Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens it, he was directed to a site and logged using his credit card number. After a few days,he learned that his card was use by someone in purchasing an expensive item. What internet threat did Kiko experience and what can you do to avoid it.
He experienced phishing
Phishing is a method of trying to gather personal information using deceptive e-mails and websites.
Here are some measures to avoid phishing. You can pick up the one you liked the most
Always check the spelling of the URLs in email links before you click or enter sensitive informationWatch out for URL redirects, where you're subtly sent to a different website with identical designIf you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply. Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social mediaHow are sensors and microprocessors used to control a central heating system which uses an oil burner as the source of heat
Answer:
sensors are used to measure physical quantities such as temperature, light, pressure, sound, and humidity. They send signals to the processor . a security alarm system may have an infrared sensor which sends a signal when the beam is broken.
Explanation:
im just smart lol
¿Por qué es importante usar adecuadamente el celular?
Answer:
to stop it from breaking
Explanation:
what do you understand by the terms:
I)input
ii)process
iii)storage
iv)output
an output device translate information processed by the computer into a form which you can understand.
input device are used to enter information such as letters, numbers, sounds or picture into a computer.
define client and.server
Answer:
Client-server model is a model is a distributed application structure that partitions
tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.
When visiting or learning about other places, what new things have you experienced? Choose all that apply.
food and drink
music and art
languages
values and ideas
technology
Answer:
All of these answers
Explanation:
PLEASEEEE HELPPP!!!!! Which graphic design tool should you use to achieve the effect in the image shown here?
A. Move
B. color and painting tools
C. Layers
D. Marquee
E. Crop
Will give brainlist if right!!! Thx
Answer:
I think the answer is b yep b
Indicate whether the following statements are true or false:
a) Viruses protection programs only scan a computer's data for harmful viruses. True or False?
b) Software piracy is the authorised distribution and use of computer programs. True or False?
c) An individual has no right to examine the contents of any personal record representing him/her. True or False?
d) Information should not be held for longer than necessary.
True or False?
e) The privacy of the individual should be protected. True or False?
Answer:C
Explanation:I got it correct on the computer
Answer: a False (they scan for all of them)
b True
c False
d True
e True
Explanation:
An investment bank has a distributed batch processing application which is hosted in an Auto Scaling group of Spot EC2 instances with an SQS queue. You configured your components to use client-side buffering so that the calls made from the client will be buffered first and then sent as a batch request to SQS. What is a period of time during which the SQS queue prevents other consuming components from receiving and processing a message
Answer: Visibility timeout
Explanation:
The period of time during which the SQS queue prevents other consuming components from receiving and processing a message is known as the visibility timeout.
It is the length of time when a message will be hidden after such message has been grabbed by a consumer. It is essential as it prevents others from processing such message again.
5.2
Explain ONE reason why the special equipment is used when
testing eyesight for a driver's licence.
(2)
Answer:
In order to reduce the risk of accidents on the roads.
Explanation:
The special equipment is used when testing eyesight for a driver's license in order to reduce the risk of accidents on the roads. Good eyesight is very important for good and safe driving so to find out the eyesight of the driver, the license officer used special equipment in order to check driver's eyes. If the eyesight is good, the officer provide license to the person otherwise not so that no accidents happen on the road.
What is the next line?
>>>
tupleB = (5, 7, 5, 10, 2,5)
tupleB.index(5,3)
>>>
A. 0
B. 5
C. 3
D. 1
The right answer is option 4: 2
Explanation:
Lists are used in Python to store elements of same or different data types.
Different functions are used in Python on List. One of them is count.
Count is used to count how many times a specific value occurs in a list.
The syntax for count is:
listname.count(value)
In the given code,
The output will be 2
Hence,
The right answer is option 4: 2
Have you searched Buzz Ch.at on playstore
Answer:
Reorder terms.
y=52x−1
Cancel the common factor of 22.Factor 22 out of −2-2.
y−4=5x2+52⋅(2(−1))y-4=5x2+52⋅(2(-1))
Cancel the common factor.
y−4=5x2+52⋅(2⋅−1)y-4=5x2+52⋅(2⋅-1)
Rewrite the expression.
y−4=5x2+5⋅−1y-4=5x2+5⋅-1
Multiply 55 by −1-1.
y−4=5x2−5
How Many types of application Software are there?
Answer:
there are 2 types of application software
Which statement is true? Select 3 options.
1. Deques can be created empty.
2. Deques are lists.
3. Lists are deques.
4. Deques can contain lists.
5. A deque is a type of collection.
Answer:
2nd statement is True dear!!!
Answer:
Deques can contain lists.
A deque is a type of collection.
Deques can be created empty.
Explanation:
Answers can be found in Edge instructions
"You can make a deque whose members are lists."
"You can create an empty deque or create a deque with a list or a string."
"You have used lists and deques, which are two types of collections used by Python. "
A folder has been shared with other users and set to read-only. What does this mean for users?
Users can only read the name of the shared folder.
Users cannot add new folders or files.
Users can read and edit files.
Users can add new files but not new folders.
Answer:
It means that users can only read or, depending on that platform, read and edit files in the folder
Identify the error and write correct HTML program 5 Cyber Bullying Tips<\head>Don't Respond Talk to a trusted adult <|html>
Answer:
<html>
<head> Cyber Bullying Tips </head>
<body>
Don't Respond, Talk to a trusted adult
</body>
</html>
todas las computadoras son controladas por hardware?
Answer:
"La placa base está compuesta de más partes que alimenten y controlen el equipo. A diferencia del software, el hardware es una entidad física. ... Sin embargo, sin la creación de hardware para realizar tareas dirigidas por software a través de la unidad central de procesamiento, el software sería inútil."
Explanation:
(Sorry, I don't know much Spanish, so there might be mistakes. I hope this helps you.)
who established computer
Answer:
Charles Babbage
Explanation:
I studied abt him